GCHQ

Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom.[3] Based in "The Doughnut" in the suburbs of Cheltenham, GCHQ is the responsibility of the country's Secretary of State for Foreign and Commonwealth Affairs, but it is not a part of the Foreign Office and its Director ranks as a Permanent Secretary.

Government Communications Headquarters (GCHQ)
Agency overview
Formed1 November 1919 (1919-11-01) (as Government Code and Cypher School)
Preceding agencies
JurisdictionHer Majesty's Government
HeadquartersHubble Road
Cheltenham, England
United Kingdom
51°53′58″N 2°07′28″W
Employees5,806 (31 March 2016)[1]
Annual budgetSingle Intelligence Account (£3.02 billion in 2017–2018 financial year)[2][nb 1]
Minister responsible
Agency executive
Child agencies
Websitewww.gchq.gov.uk
Footnotes
  1. This is a single budget for all the services – GCHQ, MI5 and SIS. The analysis of how this budget is spent between each service is undisclosed.
The headquarters of GCHQ in 2017

GCHQ was originally established after the First World War as the Government Code and Cypher School (GC&CS)[4] and was known under that name until 1946. During the Second World War it was located at Bletchley Park, where it was responsible for breaking the German Enigma codes. There are two main components of the GCHQ, the Composite Signals Organisation (CSO), which is responsible for gathering information, and the National Cyber Security Centre (NCSC), which is responsible for securing the UK's own communications. The Joint Technical Language Service (JTLS) is a small department and cross-government resource responsible for mainly technical language support and translation and interpreting services across government departments. It is co-located with GCHQ for administrative purposes.

In 2013, GCHQ received considerable media attention when the former National Security Agency contractor Edward Snowden revealed that the agency was in the process of collecting all online and telephone data in the UK via the Tempora programme.[5] Snowden's revelations began a spate of ongoing disclosures of global surveillance. The Guardian newspaper was then forced to destroy all incriminating files given to them by Snowden because of the threats of lawsuits from the UK Government.[6]

Structure

GCHQ is led by the Director of GCHQ, Jeremy Fleming,[7] and a Corporate Board, made up of executive and non-executive directors. Reporting to the Corporate Board is:[8][9]

  • Sigint missions: comprising maths and cryptanalysis, IT and computer systems, linguistics and translation, and the intelligence analysis unit
  • Enterprise: comprising applied research and emerging technologies, corporate knowledge and information systems, commercial supplier relationships, and biometrics
  • Corporate management: enterprise resource planning, human resources, internal audit, and architecture
  • Communications-Electronics Security Group

History

Government Code and Cypher School (GC&CS)

During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as Room 40) respectively.[10][11] In 1919, the Cabinet's Secret Service Committee, chaired by Lord Curzon, recommended that a peacetime codebreaking agency should be created, a task which was given to the Director of Naval Intelligence, Hugh Sinclair.[12] Sinclair merged staff from NID25 and MI1b into the new organisation, which initially consisted of around 25–30 officers and a similar number of clerical staff.[13] It was titled the "Government Code and Cypher School", a cover-name which was chosen by Victor Forbes of the Foreign Office.[14] Alastair Denniston, who had been a member of NID25, was appointed as its operational head.[12] It was initially under the control of the Admiralty and located in Watergate House, Adelphi, London.[12] Its public function was "to advise as to the security of codes and cyphers used by all Government departments and to assist in their provision", but also had a secret directive to "study the methods of cypher communications used by foreign powers".[15] GC&CS officially formed on 1 November 1919,[16] and produced its first decrypt prior to that date, on 19 October.[12]

Allidina Visram school in Mombasa, pictured above in 2006, was the location of the British "Kilindini" codebreaking outpost during World War II

Before the Second World War, GC&CS was a relatively small department. By 1922, the main focus of GC&CS was on diplomatic traffic, with "no service traffic ever worth circulating"[17] and so, at the initiative of Lord Curzon, it was transferred from the Admiralty to the Foreign Office.[18] GC&CS came under the supervision of Hugh Sinclair, who by 1923 was both the Chief of SIS and Director of GC&CS.[12] In 1925, both organisations were co-located on different floors of Broadway Buildings, opposite St. James's Park.[12] Messages decrypted by GC&CS were distributed in blue-jacketed files that became known as "BJs".[19] In the 1920s, GC&CS was successfully reading Soviet Union diplomatic cyphers. However, in May 1927, during a row over clandestine Soviet support for the General Strike and the distribution of subversive propaganda, Prime Minister Stanley Baldwin made details from the decrypts public.[20]

During the Second World War, GC&CS was based largely at Bletchley Park, in present-day Milton Keynes, working on understanding the German Enigma machine and Lorenz ciphers.[21] In 1940, GC&CS was working on the diplomatic codes and ciphers of 26 countries, tackling over 150 diplomatic cryptosystems.[22] Senior staff included Alastair Denniston, Oliver Strachey, Dilly Knox, John Tiltman, Edward Travis, Ernst Fetterlein, Josh Cooper, Donald Michie, Alan Turing, Gordon Welchman, Joan Clarke, Max Newman, William Tutte, I. J. (Jack) Good, Peter Calvocoressi and Hugh Foss.[23]

An outstation in the Far East, the Far East Combined Bureau was set up in Hong Kong in 1935 and moved to Singapore in 1939. Subsequently, with the Japanese advance down the Malay Peninsula, the Army and RAF codebreakers went to the Wireless Experimental Centre in Delhi, India. The Navy codebreakers in FECB went to Colombo, Ceylon, then to Kilindini, near Mombasa, Kenya.[24]

GC&CS was renamed the "Government Communications Headquarters" in June 1946.[25]

Post Second World War

GCHQ was at first based in Eastcote, but in 1951[26] moved to the outskirts of Cheltenham, setting up two sites there – Oakley and Benhall. Duncan Campbell and Mark Hosenball revealed the existence of GCHQ in 1976 in an article for Time Out; as a result, Hosenball was deported from the UK.[27][28] GCHQ had a very low profile in the media until 1983 when the trial of Geoffrey Prime, a KGB mole within GCHQ, created considerable media interest.[29]

Since the days of the Second World War, US and British intelligence have shared information. For the GCHQ this means that it shares information with, and gets information from, the National Security Agency (NSA) in the United States.[30]

Trade union disputes

NUCPS banner on march in Cheltenham 1992

In 1984, GCHQ was the centre of a political row when the Conservative government of Margaret Thatcher prohibited its employees from belonging to a trade union. It was claimed that joining a union would be in conflict with national security. A number of mass national one-day strikes were held to protest this decision, seen as the first step to wider bans on trade unions. Appeals to British Courts and European Commission of Human Rights[31] were unsuccessful. The government offered a sum of money to each employee who agreed to give up their union membership. Appeal to the ILO resulted in a decision that government's actions were in violation of Freedom of Association and Protection of the Right to Organise Convention.[32]

The ban was eventually lifted by the incoming Labour government in 1997, with the Government Communications Group of the Public and Commercial Services Union (PCS) being formed to represent interested employees at all grades.[33] In 2000, a group of 14 former GCHQ employees, who had been dismissed after refusing to give up their union membership, were offered re-employment, which three of them accepted.[34]

Post Cold War

1990s: Post-Cold War restructuring

The Intelligence Services Act 1994 placed the activities of the intelligence agencies on a legal footing for the first time, defining their purpose, and the British Parliament's Intelligence and Security Committee was given a remit to examine the expenditure, administration and policy of the three intelligence agencies.[35] The objectives of GCHQ were defined as working as "in the interests of national security, with particular reference to the defence and foreign policies of Her Majesty's government; in the interests of the economic wellbeing of the United Kingdom; and in support of the prevention and the detection of serious crime".[36] During the introduction of the Intelligence Agency Act in late 1993, the former Prime Minister Jim Callaghan had described GCHQ as a "full-blown bureaucracy", adding that future bodies created to provide oversight of the intelligence agencies should "investigate whether all the functions that GCHQ carries out today are still necessary."[37]

In 1993, in the wake of the "Squidgygate" affair, GCHQ denied "intercepting, recording or disclosing" the telephone calls of the British Royal family.[38]

In late 1993 civil servant Michael Quinlan advised a deep review of the work of GCHQ following the conclusion of his "Review of Intelligence Requirements and Resources", which had imposed a 3% cut on the agency.[39] The Chief Secretary to the Treasury, Jonathan Aitken, subsequently held face to face discussions with the intelligence agency directors to assess further savings in the wake of Quinlan's review. Aldrich (2010) suggests that Sir John Adye, the then Director of GCHQ performed badly in meetings with Aitken, leading Aitken to conclude that GCHQ was "suffering from out-of-date methods of management and out-of-date methods for assessing priorities".[40] GCHQ's budget was £850 million in 1993, (£1.74 billion as of 2019)[41] compared to £125 million for the Security Service and SIS (MI5 and MI6). In December 1994 the businessman Roger Hurn was commissioned to begin a review of GCHQ, which was concluded in March 1995.[42] Hurn's report recommended a cut of £100  million in GCHQ's budget; such a large reduction had not been suffered by any British intelligence agency since the end of World War II.[42] The J Division of GCHQ, which had collected SIGINT on Russia, disappeared as a result of the cuts.[42] The cuts had been mostly reversed by 2000 in the wake of threats from violent non-state actors, and risks from increased terrorism, organised crime and illegal access to nuclear, chemical and biological weapons.[43]

David Omand became the Director of GCHQ in 1996, and greatly restructured the agency in the face of new and changing targets and rapid technological change.[44] Omand introduced the concept of "Sinews" (or "SIGINT New Systems") which allowed more flexible working methods, avoiding overlaps in work by creating fourteen domains, each with a well-defined working scope.[44] The tenure of Omand also saw the planning and the creation of The Doughnut, GCHQ's modern headquarters.[44] Located on a 176-acre site in Benhall, near Cheltenham, The Doughnut would be the largest building constructed for secret intelligence operations outside the United States.[45]

Operations at GCHQ's Chung Hom Kok listening station in Hong Kong ended in 1994.[46] GCHQ's Hong Kong operations were extremely important to their relationship with the NSA, who contributed investment and equipment to the station. In anticipation of the transfer of Hong Kong to the Chinese government in 1997, the Hong Kong stations operations were moved to Australian Defence Satellite Communications Station in Geraldton in Western Australia.[47]

Operations that used GCHQ's intelligence-gathering capabilities in the 1990s included the monitoring of communications of Iraqi soldiers in the Gulf War, of dissident republican terrorists and the Real IRA, of the various factions involved in the Yugoslav Wars, and of the criminal Kenneth Noye.[43][47][48] In the mid 1990s GCHQ began to assist in the investigation of cybercrime.[49]

2000s: Coping with the Internet

At the end of 2003, GCHQ moved to a new circular HQ (popularly known as "The Doughnut"). At the time, it was the second-largest public-sector building project in Europe, with an estimated cost of £337 million. The new building, which was designed by Gensler and constructed by Carillion, became the base for all of GCHQ's Cheltenham operations.[50]

The public spotlight fell on GCHQ in late 2003 and early 2004 following the sacking of Katharine Gun after she leaked to The Observer a confidential email from agents at the United States' National Security Agency addressed to GCHQ agents about the wiretapping of UN delegates in the run-up to the 2003 Iraq war.[51]

GCHQ gains its intelligence by monitoring a wide variety of communications and other electronic signals. For this, a number of stations have been established in the UK and overseas. The listening stations are at Cheltenham itself, Bude, Scarborough, Ascension Island, and with the United States at Menwith Hill.[52] Ayios Nikolaos Station in Cyprus is run by the British Army for GCHQ.[53]

In March 2010, GCHQ was criticised by the Intelligence and Security Committee for problems with its IT security practices and failing to meet its targets for work targeted against cyber attacks.[54]

As revealed by Edward Snowden in The Guardian, GCHQ spied on foreign politicians visiting the 2009 G-20 London Summit by eavesdropping phonecalls and emails and monitoring their computers, and in some cases even ongoing after the summit via keyloggers that had been installed during the summit.[55]

According to Edward Snowden, GCHQ has two principal umbrella programs for collecting communications:

GCHQ also has had access to the US internet monitoring programme PRISM since at least June 2010.[57] PRISM is said to give the National Security Agency and FBI easy access to the systems of nine of the world's top internet companies, including Google, Facebook, Microsoft, Apple, Yahoo, and Skype.[58]

2010s

In February 2014, The Guardian, based on documents provided by Snowden, revealed that GCHQ had indiscriminately collected 1.8 million private Yahoo webcam images from users across the world.[59] In the same month NBC and The Intercept, based on documents released by Snowden, revealed the Joint Threat Research Intelligence Group and the Computer Network Exploitation units within GCHQ. Their mission was cyber operations based on "dirty tricks" to shut down enemy communications, discredit, and plant misinformation on enemies.[60] These operations were 5% of all GCHQ operations according to a conference slideshow presented by the GCHQ.[61]

Soon after becoming Director of GCHQ in 2014, Robert Hannigan wrote an article in the Financial Times on the topic of internet surveillance, stating that "however much [large US technology companies] may dislike it, they have become the command and control networks of choice for terrorists and criminals" and that GCHQ and its sister agencies "cannot tackle these challenges at scale without greater support from the private sector", arguing that most internet users "would be comfortable with a better and more sustainable relationship between the [intelligence] agencies and the tech companies". Since the 2013 global surveillance disclosures, large US technology companies have improved security and become less co-operative with foreign intelligence agencies, including those of the UK, generally requiring a US court order before disclosing data.[62][63] However the head of the UK technology industry group techUK rejected these claims, stating that they understood the issues but that disclosure obligations "must be based upon a clear and transparent legal framework and effective oversight rather than, as suggested, a deal between the industry and government".[64]

In 2015, documents obtained by The Intercept from US National Security Agency whistleblower Edward Snowden revealed that GCHQ had carried out a mass-surveillance operation, codenamed KARMA POLICE, since about 2008.[65] The operation swept up the IP address of Internet users visiting websites, and was established with no public scrutiny or oversight. KARMA POLICE is a powerful spying tool in conjunction with other GCHQ programs because IP addresses could be cross-referenced with other data.[65] The goal of the program, according to the documents, was "either (a) a web browsing profile for every visible user on the internet, or (b) a user profile for every visible website on the internet."[65]

In 2015, GCHQ admitted for the first time in court that it conducts computer hacking.[66]

In 2017, US Press Secretary Sean Spicer alleged that GCHQ had conducted surveillance on US President Donald Trump, basing the allegation on statements made by a media commentator during a Fox News segment.[67][68] The US government formally apologised for the allegations and promised they would not be repeated.[69][70][71] However, surveillance of Russian agents did pick up contacts made by Trump's campaign team in the run-up to his election, which were passed on to US agencies.[72][73]

On 31 October 2018, GCHQ joined Instagram.[74][75]

Security mission

As well as a mission to gather intelligence, GCHQ has for a long-time had a corresponding mission to assist in the protection of the British government's own communications. When the Government Code and Cypher School (GC&CS) was created in 1919, its overt task was providing security advice.[76] GC&CS's Security section was located in Mansfield College, Oxford during the Second World War.[76]

In April 1946, GC&CS became GCHQ, and the now GCHQ Security section moved from Oxford to join the rest of the organisation at Eastcote later that year.[76]

LCSA

From 1952 to 1954, the intelligence mission of GCHQ relocated to Cheltenham; the Security section remained at Eastcote,[76] and in March 1954 became a separate, independent organisation: the London Communications Security Agency (LCSA),[76] which in 1958 was renamed to the London Communications-Electronic Security Agency (LCESA).[76]

In April 1965, GPO and MOD units merged with LCESA to become the Communications-Electronic Security Department (CESD).[76]

CESG

In October 1969, CESD was merged into GCHQ and becoming Communications-Electronic Security Group (CESG).[76]

In 1977 CESG relocated from Eastcote to Cheltenham.[76]

CESG continued as the UK National Technical Authority for information assurance, including cryptography. CESG did not manufacture security equipment, but worked with industry to ensure the availability of suitable products and services, while GCHQ itself funded research into such areas, for example to the Centre for Quantum Computation at Oxford University and the Heilbronn Institute for Mathematical Research at the University of Bristol.[77]

In the 21st century, CESG ran a number of assurance schemes such as CHECK, CLAS, Commercial Product Assurance (CPA) and CESG Assisted Products Service (CAPS).[78]

Public key encryption

In late 1969 the concept for public-key encryption was developed and proven by James H. Ellis, who had worked for CESG (and before it, CESD) since 1965. Ellis lacked the number theory expertise necessary to build a workable system. Subsequently, a feasible implementation scheme via an asymmetric key algorithm was invented by another staff member Clifford Cocks, a mathematics graduate. This fact was kept secret until 1997.[79]

NCSC

In 2016, the National Cyber Security Centre was established under GCHQ but located in London, as the UK's authority on cybersecurity. It absorbed and replaced CESG as well as activities that had previously existed outside GCHQ: the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the Centre for the Protection of National Infrastructure (CPNI).[80]

Joint Technical Language Service

The Joint Technical Language Service (JTLS) was established in 1955,[81] drawing on members of the small Ministry of Defence technical language team and others, initially to provide standard English translations for organisational expressions in any foreign language, discover the correct English equivalents of technical terms in foreign languages and discover the correct expansions of abbreviations in any language.[82] The remit of the JTLS has expanded in the ensuing years to cover technical language support and interpreting and translation services across the UK Government and to local public sector services in Gloucestershire and surrounding counties. The JTLS also produces and publishes foreign language working aids under crown copyright and conducts research into machine translation and on-line dictionaries and glossaries. The JTLS is co-located with GCHQ for administrative purposes.[83]

International relationships

GCHQ operates in partnership with equivalent agencies worldwide in a number of bi-lateral and multi-lateral relationships. The principal of these is with the United States (National Security Agency), Canada (Communications Security Establishment), Australia (Australian Signals Directorate) and New Zealand (Government Communications Security Bureau), through the mechanism of the UK-US Security Agreement, a broad intelligence-sharing agreement encompassing a range of intelligence collection methods. Relationships are alleged to include shared collection methods, such as the system described in the popular media as ECHELON, as well as analysed product.[84]

GCHQ's legal basis is enshrined in the Intelligence Services Act 1994 Section 3 as follows:

(1) There shall continue to be a Government Communications Headquarters under the authority of the Secretary of State; and, subject to subsection (2) below, its functions shall be—

(a) to monitor or interfere with electromagnetic, acoustic and other emissions and any equipment producing such emissions and to obtain and provide information derived from or related to such emissions or equipment and from encrypted material; and
(b) to provide advice and assistance about—
(i) languages, including terminology used for technical matters, and
(ii) cryptography and other matters relating to the protection of information and other material, to the armed forces of the Crown, to Her Majesty's Government in the United Kingdom or to a Northern Ireland Department or to any other organisation which is determined for the purposes of this section in such manner as may be specified by the Prime Minister.

(2) The functions referred to in subsection (1)(a) above shall be exercisable only—

(a) in the interests of national security, with particular reference to the defence and foreign policies of Her Majesty's Government in the United Kingdom; or
(b) in the interests of the economic well-being of the United Kingdom in relation to the actions or intentions of persons outside the British Islands; or
(c) in support of the prevention or detection of serious crime.

(3) In this Act, the expression "GCHQ" refers to the Government Communications Headquarters and to any unit or part of a unit of the armed forces of the Crown which is for the time being required by the Secretary of State to assist the Government Communications Headquarters in carrying out its functions.[85]

Activities that involve interception of communications are permitted under the Regulation of Investigatory Powers Act 2000; this kind of interception can only be carried out after a warrant has been issued by a Secretary of State. The Human Rights Act 1998 requires the intelligence agencies, including GCHQ, to respect citizens' rights as described in the European Convention on Human Rights.[86][87][88]

Oversight

The Prime Minister nominates cross-party Members of Parliament to an Intelligence and Security Committee. The remit of the Committee includes oversight of intelligence and security activities and reports are made directly to Parliament.[89] Its functions were increased under the Justice and Security Act 2013 to provide for further access and investigatory powers.

Judicial oversight of GCHQ's conduct is exercised by the Investigatory Powers Tribunal.[90] The UK also has an independent Intelligence Services Commissioner and Interception of Communications Commissioner, both of whom are former senior judges.[91]

The Investigatory Powers Tribunal ruled in December 2014 that GCHQ does not breach the European Convention of Human Rights, and that its activities are compliant with Articles 8 (right to privacy) and 10 (freedom of expression) of the European Convention of Human Rights.[87] However, the Tribunal stated in February 2015 that one particular aspect, the data-sharing arrangement that allowed UK Intelligence services to request data from the US surveillance programmes Prism and Upstream, had been in contravention of human rights law prior to this until two paragraphs of additional information, providing details about the procedures and safeguards, were disclosed to the public in December 2014.[92][93][94]

Furthermore, the IPT ruled that the legislative framework in the United Kingdom does not permit mass surveillance and that while GCHQ collects and analyses data in bulk, it does not practice mass surveillance.[87][95][96] This complements independent reports by the Interception of Communications Commissioner,[97] and a special report made by the Intelligence and Security Committee of Parliament; although several shortcomings and potential improvements to both oversight and the legislative framework were highlighted.[98]

Abuses

Despite the inherent secrecy around much of GCHQ's work, investigations carried out by the UK government after the Snowden disclosures have admitted various abuses by the security services. A report by the Intelligence and Security Committee (ISC) in 2015 revealed that a small number of staff at UK intelligence agencies had been found to misuse their surveillance powers, in one case leading to the dismissal of a member of staff at GCHQ, although there were no laws in place at the time to make these abuses a criminal offence.[99]

Later that year, a ruling by the Investigatory Powers Tribunal found that GCHQ acted unlawfully in conducting surveillance on two human rights organisations. The closed hearing found the government in breach of its internal surveillance policies in accessing and retaining the communications of the Egyptian Initiative for Personal Rights and the Legal Resources Centre in South Africa. This was only the second time in the IPT's history that it had made a positive determination in favour of applicants after a closed session.[100]

At another IPT case in 2015, GCHQ conceded that "from January 2010, the regime for the interception/obtaining, analysis, use, disclosure and destruction of legally privileged material has not been in accordance with the law for the purposes of Article 8(2) of the European convention on human rights and was accordingly unlawful".[101] This admission was made in connection with a case brought against them by Abdelhakim Belhaj, a Libyan opponent of the former Gaddafi regime, and his wife Fatima Bouchard. The couple accused British ministers and officials of participating in their unlawful abduction, kidnapping and removal to Libya in March 2004, while Gaddafi was still in power.[102]

Surveillance of parliamentarians

In 2015 there was a complaint by Green Party MP Caroline Lucas that British intelligence services, including GCHQ, had been spying on MPs allegedly "in defiance of laws prohibiting it."[103] GCHQ had introduced a policy in March 2015 that did not require approval by the Prime Minister, or any minister, before deliberately targeting the communications of a parliamentarian.

Then-Home Secretary, Theresa May, had told Parliament in 2014 that:

Obviously, the Wilson Doctrine applies to parliamentarians. It does not absolutely exclude the use of these powers against parliamentarians, but it sets certain requirements for those powers to be used in relation to a parliamentarian. It is not the case that parliamentarians are excluded and nobody else in the country is, but there is a certain set of rules and protocols that have to be met if there is a requirement to use any of these powers against a parliamentarian.[104]

The Investigatory Powers Tribunal investigated the complaint, and ruled that contrary to the allegation, there was no law that gave the communications of parliament any special protection.[105] The Wilson Doctrine merely acts as a political convention.[106]

A controversial GCHQ case determined the scope of judicial review of prerogative powers (the Crown's residual powers under common law). This was Council of Civil Service Unions v Minister for the Civil Service [1985] AC 374 (often known simply as the "GCHQ case"). In this case, a prerogative Order in Council had been used by the prime minister (who is the Minister for the Civil Service) to ban trade union activities by civil servants working at GCHQ. This order was issued without consultation. The House of Lords had to decide whether this was reviewable by judicial review. It was held that executive action is not immune from judicial review simply because it uses powers derived from common law rather than statute (thus the prerogative is reviewable).[107]

Leadership

The following is a list of the heads and operational heads of GCHQ and GC&CS:

Stations and former stations

The following are stations and former stations that have operated since the Cold War.

Stations:[108]

Former stations:[109]

GCHQ Certified Training

The GCHQ Certified Training (GCT) scheme was established to certify two main levels of cybersecurity training. There are also degree and masters level courses. These are:

  • Awareness Level Training: giving an understanding and a foundation in cybersecurity concepts; and
  • Application Level Training: a more in-depth course

The GCT scheme was designed to help organisations find the right training that also met GCHQ's exacting standards. It was designed to assure high-quality cybersecurity training courses where the training provider had also undergone rigorous quality checks. The GCT process is carried out by APMG as the independent certification body. The scheme is part of the National Cyber Security Programme established by the Government to develop knowledge, skills and capability in all aspects of cybersecurity in the, and is based on the IISP Skills Framework.[110]

The historical drama film The Imitation Game (2014) featured Benedict Cumberbatch portraying Alan Turing's efforts to break the Enigma code while employed by the Government Code and Cypher School.[111]

GCHQ have set a number of cryptic online challenges to the public, used to attract interest and for recruitment, starting in late 1999.[112][113] The response to the 2004 challenge was described as "excellent",[114] and the challenge set in 2015 had over 600,000 attempts.[115] It also published the GCHQ puzzle book in 2016 which sold more than 300,000 copies, with the proceeds going to charity. A second book was published in October 2018.[116]

GCHQ appeared on the Doctor Who 2019 special "Resolution" as the site of an attack from a Reconnaissance Scout Dalek, which was seeking to use the organisation's resources to summon a Dalek fleet.[117][118]

gollark: Fairly complex, but you can apply a lot of parsing algorithms to it.
gollark: Well, I was considering a JSON validator.
gollark: If by immediately you mean next year, yes.
gollark: Interesting.
gollark: Iff Riemann hypothesis.

See also

GCHQ units:

GCHQ specifics:

  • Capenhurst – said to be home to a GCHQ monitoring site in the 1990s
  • Hugh Alexander – head of the cryptanalysis division at GCHQ from 1949 to 1971
  • Operation Socialist, a 2010–13 operation in Belgium
  • Zircon, the 1980s cancelled GCHQ satellite project

UK agencies:

Elsewhere:

Notes and references

  1. Intelligence and Security Committee of Parliament "Annual Report 2016–2017", page 84. House of Commons (20 December 2017). Retrieved 1 June 2018.
  2. "Financial Statement 2017-18" (PDF). Security and Intelligence Agencies. p. 13. Retrieved 2 April 2020.
  3. GCHQ – Welcome to GCHQ, Government of the United Kingdom. Retrieved 7 July 2014.
  4. Headrick, Daniel R. (1991) The invisible Weapon: Telecommunications and International Politics 1851-1945, Oxford UP p219
  5. "A simple guide to GCHQ's internet surveillance programme Tempora". Wired UK. 24 June 2013.
  6. Borger, Julian (21 August 2013). "NSA files: why the Guardian in London destroyed hard drives of leaked files". The Guardian. Retrieved 27 May 2018.
  7. "MI5 veteran Jeremy Fleming named as new GCHQ head". Sky News. Retrieved 21 March 2017.
  8. Aldrich, 2010, p. 565
  9. (secondary) Leong, Angela (2007). The Disruption of International Organised Crime: An Analysis of Legal and Non-Legal Strategies. Ashgate Publishing. ISBN 978-0-7546-7066-7. Retrieved 19 April 2012.
  10. Gannon, Paul (2011). Inside Room 40: The Codebreakers of World War I. Ian Allan Publishing. ISBN 978-0-7110-3408-2.
  11. Johnson, 1997, p. 27
  12. Johnson, 1997, p. 44
  13. Johnson, 1997, p. 45 and Kahn, 1991, p. 82; these sources give different numbers for the initial size of the GC&CS staff
  14. Macksey, Kenneth (2003). The Searchers: How Radio Interception Changed the Course of Both World Wars. Cassell Military. p. 58. ISBN 0-304-36545-9.
  15. Smith, 2001, pp. 16–17
  16. Kahn, 1991, p. 82
  17. Denniston, Alastair G. (1986). "The Government Code and Cypher School Between the Wars". Intelligence and National Security. 1 (1): 48–70. doi:10.1080/02684528608431841.
  18. Smith, 2001, pp. 20–21
  19. Smith, 2001, pp. 18–19
  20. Aldrich, 2010, p. 18
  21. Gannon, Paul (2006). Colossus: Bletchley Park's Greatest Secret. Atlantic Books. ISBN 978-1-84354-331-2.
  22. Alvarez, David (2001). "Most Helpful and Cooperative: GC&CS and the Development of American Diplomatic Cryptanalysis, 1941–1942". In Smith, Michael; Erskine, Ralph (eds.). Action This Day: Bletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer. Bantam Press. ISBN 978-0593049105.
  23. Erskine, Ralph; Smith, Michael, eds. (2011), The Bletchley Park Codebreakers, Biteback Publishing Ltd, ISBN 978-1-84954-078-0
  24. "Mombasa was base for high-level UK espionage operation". Coastweek. Retrieved 25 February 2018.
  25. Smith, Michael (1998). Station X. Channel 4 books. p. 176. ISBN 0-330-41929-3.
  26. "History of GCHQ Cheltenham". GCHQ website 'About Us' pages. Archived from the original on 5 October 2006. Retrieved 29 June 2006.
  27. Duncan Campbell; Mark Hosenball (21 May 1976). "The Eavesdroppers" (PDF). Time Out. Retrieved 1 March 2016.
  28. Court ruling, "R v Secretary of State for the Home Department, ex parte Hosenball", [1977] 1 W.L.R. 766; [1977] 3 All E.R. 452. Lord Denning presiding judge, 29 March 1977.
  29. Aldrich, 2010, p. 382
  30. Murray, Craig (16 October 2007). Dirty Diplomacy. Scribner. p. 332. ISBN 978-1416548010.
  31. "EComHR Inadmissibility decision of EComHR on application no. 11603/85". 1987.
  32. "EComHR Inadmissibility decision of EComHR on application no. 11603/85 – The Facts". para. IV
  33. "Union representation". GCHQ website. Archived from the original on 9 May 2006. Retrieved 12 April 2006.
  34. "Sacked GCHQ workers win compensation". BBC News. 1 February 2000. Retrieved 12 April 2006.
  35. "ISC – About". The Intelligence and Security Committee of Parliament – About the Committee. Intelligence and Security Committee of Parliament. Retrieved 1 December 2013.
  36. "Intelligence Services Act 1994". The National Archives. Retrieved 1 December 2013.
  37. "Hansard: December 1993 Intelligence Services Bill". Hansard. 9 December 1993.
  38. Aldrich 2010, p. 483
  39. Aldrich 2010, p. 493
  40. Aldrich 2010, p. 494
  41. UK Retail Price Index inflation figures are based on data from Clark, Gregory (2017). "The Annual RPI and Average Earnings for Britain, 1209 to Present (New Series)". MeasuringWorth. Retrieved 2 February 2020.
  42. Aldrich 2010, p. 495
  43. Aldrich 2010, p. 505
  44. Aldrich 2010, p. 496
  45. Aldrich 2010, p. 9
  46. Aldrich 2010, p. 475
  47. Nigel West (31 August 2012). Historical Dictionary of Signals Intelligence. Scarecrow Press. pp. 27–. ISBN 978-0-8108-7391-9.
  48. Aldrich 2010, p. 473
  49. Aldrich 2010, p. 489
  50. "Carillion set for growth". BBC News. 19 September 2000.
  51. Aldrich, 2010, p. 521
  52. Campbell, Duncan (1981). "Phone tappers and the state". New Statesman: 54.
  53. Aldrich, 2010, p. 471
  54. "'Cavalier' GCHQ online spy centre loses 35 laptops". Computerworld UK. 12 March 2010.
  55. The Guardian: GCHQ intercepted foreign politicians' communications at G20 summits, 16 June 2013
  56. Philip Bump (21 June 2013). "The UK Tempora Program Captures Vast Amounts of Data – and Shares with NSA". The Atlantic Wire. Retrieved 23 June 2013.
  57. "Statement on GCHQ's Alleged Interception of Communications under the US PRISM Programme" (PDF). Intelligence and Security Committee of Parliament. 17 July 2013. Retrieved 17 December 2013.
  58. "Scale and significance of NSA snooping claims". BBC. 11 June 2013.
  59. Ackerman, Spencer; Ball, James (28 February 2014). "Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ". The Guardian. Retrieved 2 March 2014.
  60. "Snowden Docs: British Spies Used Sex and 'Dirty Tricks'". NBC News. 7 February 2014. Retrieved 7 February 2014.
  61. "The Snowden Files: British Spies Used Sex and 'Dirty' Tricks" (PDF). NBC News Investigations. NBC. Archived from the original (PDF) on 12 January 2015. Retrieved 5 April 2015.
  62. Robert Hannigan (3 November 2014). "The web is a terrorist's command-and-control network of choice". Financial Times. Retrieved 3 November 2014.
  63. Sam Jones and Murad Ahmed (3 November 2014). "Tech groups aid terror, says UK spy chief". Financial Times. Retrieved 3 November 2014.
  64. David Barrett (4 November 2014). "Tech giants reject GCHQ boss Robert Hannigan's call for deal with government". The Daily Telegraph. Retrieved 5 November 2014.
  65. Ryan Gallager, Profiled: From Radio to Porn, British Spies Track Web Users' Online Identities, The Intercept (25 September 2015).
  66. Croft, Jane (1 December 2015) UK spy agency GCHQ admits it carries out computer hacking. Financial Times
  67. Farrell, Henry (16 March 2017) Sean Spicer just suggested that Obama used British intelligence to spy on Trump. Not so much. The Washington Post
  68. Blake, Aaron (16 March 2017) Sean Spicer's angry, lonely defense of Trump's wiretapping claim, annotated. The Washington Post
  69. "US makes formal apology to Britain after White House accuses GCHQ of wiretapping Trump Tower". The Telegraph. 17 March 2017. Archived from the original on 22 March 2017. Retrieved 17 March 2017.
  70. "White House apologizes to British government over spying claims". CNN. 17 December 2017. Retrieved 17 March 2017.
  71. "GCHQ dismisses 'utterly ridiculous' claim it helped wiretap Trump | US news". The Guardian. 17 March 2017. Retrieved 13 April 2017.
  72. Harding, Luke; Kirchgaessner, Stephanie; Hopkins, Nick (13 April 2017). "British spies were first to spot Trump team's links with Russia". The Guardian. Retrieved 13 April 2017.
  73. "British intelligence passed Trump associates' communications with Russians on to US counterparts". CNN. 14 April 2017. Retrieved 14 April 2017.
  74. "GCHQ (@gchq) • Instagram photos and videos". www.instagram.com. Retrieved 1 November 2018.
  75. Weaver, Matthew (31 October 2018). "GCHQ uses Instagram to 'open up world of espionage' to public". the Guardian. Retrieved 1 November 2018.
  76. "Operational Selection Policy OSP8" (PDF). Retrieved 24 January 2018.
  77. "Heilbronn Institute for Mathematical Research". University of Bristol. Retrieved 30 August 2008.
  78. "CESG Service Catalogue". Archived from the original on 20 August 2015. Retrieved 17 August 2015.
  79. Singh, Simon. "Unsung Heroes of Cryptography". (originally published in The Sunday Telegraph)
  80. "About us". National Cyber Security Centre. Retrieved 9 March 2017.
  81. Newmark, Peter (1991). About Translation. Multilingual Matters. p. 40. ISBN 1-85359-118-1.
  82. Joint Technical Language Service. Russian-English Military Dictionary (English and Russian Edition). The Stationery Office. ISBN 9780112300199.
  83. "Government Communications Headquarters, Cheltenham; Joint Technical Language Service". National Archives. Retrieved 25 February 2018.
  84. Schmid, Gerhard (11 July 2001). "On the existence of a global system for the interception of private and commercial communications (ECHELON interception system) – Temporary Committee on the ECHELON Interception System, (2001/2098(INI))" (PDF). European Parliament: Temporary Committee on the ECHELON Interception System. p. 194. Retrieved 27 March 2008.
  85. "Intelligence Services Act 1994". Government of the United Kingdom. Retrieved 28 September 2015.
  86. "The Law". GCHQ. Retrieved 17 December 2013.
  87. "GCHQ does not breach human rights, judges rule". BBC. 5 December 2014. Retrieved 6 December 2014.
  88. "The Andrew Marr Show Interview: Theresa May, MP Home Secretary" (PDF). BBC. 23 November 2014. Retrieved 6 December 2014. Well I guess what he's talking about is the fact that for certain aspects and certain of the more intrusive measures that our security service and police have available to them – i.e. Intercept, intercepting people's telephones and some other intrusive measures – the decision is taken by the Secretary of State, predominantly me. A significant part of my job is looking at these warrants and signing these warrants. I think it's... Some people argue that should be to judges....I think it's very important that actually those decisions are being taken by somebody who is democratically accountable to the public. I think that's an important part of our system. I think it's a strength of our system.
  89. "The Intelligence and Security Committee of Parliament". Retrieved 14 December 2013.
  90. "Functions – Key role". The Investigatory Powers Tribunal. Archived from the original on 6 February 2015. Retrieved 6 February 2015.
  91. "Intelligence Commissioners". Retrieved 14 December 2013.
  92. "IPT Ruling on Interception". GCHQ. Archived from the original on 6 February 2015. Retrieved 6 February 2015.
  93. "GCHQ censured over sharing of internet surveillance data with US". BBC. 6 February 2015. Retrieved 6 February 2015.
  94. "UK-US surveillance regime was unlawful 'for seven years'". The Guardian. 6 February 2015. Retrieved 6 February 2015.
  95. "IPT rejects assertions of mass surveillance". GCHQ. 5 December 2014. Archived from the original on 6 February 2015. Retrieved 7 February 2015.
  96. "List of judgments". Investigatory Powers Tribunal. 5 December 2014. Archived from the original on 6 February 2015. Retrieved 7 February 2015. 1. A declaration that the regime governing the soliciting, receiving, storing and transmitting by UK authorities of private communications of individuals located in the UK which have been obtained by US authorities pursuant to Prism and/or Upstream does not contravene Articles 8 or 10 ECHR. 2. A declaration that the regime in respect of interception under ss8(4), 15 and 16 of the Regulation of investigatory Powers Act 2000 does not contravene Articles 8 or 10 ECHR and does not give rise to unlawful discrimination contrary to Article 14, read together with Articles 8 and/or 10 of the ECHR.
  97. "Statement by the Interception of Communications Commissioner's Office (IOCCO) on the publication of the Interception of Communications Commissioner's Report 2014" (PDF). 12 March 2015. Archived from the original (PDF) on 2 April 2015. Retrieved 14 March 2015."Report of the Interception of Communications Commissioner" (PDF). March 2015. Archived from the original (PDF) on 21 March 2015. Retrieved 14 March 2015.
  98. "Privacy and Security: A modern and transparent legal framework". Intelligence and Security Committee of Parliament. 12 March 2015. Retrieved 14 March 2015."UK surveillance 'lacks transparency', ISC report says". BBC. 12 March 2015. Retrieved 14 March 2015."Intelligence and security committee report: the key findings". The Guardian. 12 March 2015. Retrieved 14 March 2015.
  99. "Handful of UK spies accessed private information inappropriately, ISC says". The Guardian. 12 March 2015. Retrieved 31 December 2016.
  100. "UK: Unlawful spying on two organisations reinforces need for intelligence services to end mass surveillance". Amnesty International UK. 22 June 2015. Retrieved 31 December 2016.
  101. "Case No. IPT/13/132-9/H IN THE INVESTIGATORY POWERS TRIBUNAL" (PDF). The Investigatory Powers Tribunal. 26 February 2015. Retrieved 31 December 2016.
  102. "Legal privilege and the conflicting interests of GCHQ and the IPT". The Guardian. 16 March 2015. Retrieved 31 December 2016.
  103. "British intelligence service spying on MPs in defiance of laws prohibiting it". The Independent. 23 July 2015. Retrieved 31 December 2016.
  104. "Daily Hansard – Debate, 15 July 2014 : Column 697". Parliament of the United Kingdom. 15 July 2014. Retrieved 31 December 2016.
  105. Thomas Tamblyn (14 October 2015). "GCHQ Can Monitor Communications Of MPs And Peers Rules Tribunal". Huffington Post.
  106. "Approved Judgment" (PDF). Investigatory Powers Tribunal. Retrieved 24 January 2018.
  107. "UKHL 9". United Kingdom House of Lords Decisions. Retrieved 25 February 2018.
  108. "Life at GCHQ | GCHQ". www.gchq-careers.co.uk. Retrieved 5 April 2019.
  109. Information, Reed Business (5 April 1984). "How Cheltenham entered America's backyard". New Scientist. Retrieved 12 December 2014.
  110. "GCHQ Certified Training (GCT)". APMG. Retrieved 18 April 2018.
  111. Thorpe, Vanessa (15 November 2014). "Benedict Cumberbatch to inspire the next generation of codebreakers". The Observer. Retrieved 6 December 2014.
  112. "Puzzling entrance to world of spies". BBC NEWS. 13 January 2000.
  113. Caroline Byrne (15 January 2000). "The Spy Who Solved Me". ABC News. Archived from the original on 22 May 2001.
  114. "Huge response to spy base puzzle". BBC NEWS. 10 July 2004.
  115. Gordon Rayner (4 February 2016). "GCHQ quiz solution: the full answers - but can you understand them?". The Daily Telegraph.
  116. Ewen MacAskill (3 August 2018). "I spy ... another fiendishly difficult GCHQ puzzle book". The Guardian.
  117. Bacon, Thomas (2 January 2019). "The U.K. Government's GCHQ has issued an official response to the Dalek attack in the Doctor Who New Year Special - no need to panic!". Screen Rant. Retrieved 15 February 2020.
  118. Bui, Hoai-Tran (2 January 2019). "'Resolution' Proves All the New 'Doctor Who' Needed Was an Old Villain". /Film. Retrieved 15 February 2020.

Bibliography

  • Aldrich, Richard J. (2010). GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency. HarperCollins. ISBN 978-0007278473.CS1 maint: ref=harv (link)
  • Johnson, John (1997). The Evolution of British Sigint: 1653–1939. HMSO. ASIN B002ALSXTC.
  • Kahn, David (1991). Seizing the Enigma: The Race to Break the German U-Boats Codes, 1939–1943. Houghton Mifflin. ISBN 978-0395427392.
  • Smith, Michael (2001). "GC&CS and the First Cold War". In Smith, Michael; Erskine, Ralph (eds.). Action This Day: Bletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer. Bantam Press. ISBN 978-0593049105.

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.