{
	"id": "3e987c93-31f0-410b-8b62-ae00df9bbbb3",
	"created_at": "2026-04-06T00:08:10.127468Z",
	"updated_at": "2026-04-10T13:12:19.173437Z",
	"deleted_at": null,
	"sha1_hash": "9c20811fe0cd22f8955d7517da9811533fa85fa4",
	"title": "GCHQ",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 611108,
	"plain_text": "GCHQ\r\nBy Contributors to Wikimedia projects\r\nPublished: 2001-11-27 · Archived: 2026-04-05 17:21:38 UTC\r\nGovernment Communications Headquarters\r\nWikimedia | © OpenStreetMap\r\nThe Doughnut from above in 2017\r\nAgency overview\r\nFormed 1 November 1919; 106 years ago (as Government Code and Cypher School)\r\nPreceding agencies\r\nMI1b (Army)\r\nNID25 (Royal Navy)\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 1 of 21\n\nJurisdiction His Majesty's Government\r\nHeadquarters\r\nThe Doughnut, Hubble Road, Cheltenham, England\r\n51°53′58″N 2°07′28″W / 51.89944°N 2.12444°W\r\nEmployees 7,181[1]\r\nAnnual budget Single Intelligence Account (£3.711 billion in 2021–2022)[1]\r\nMinister responsible Yvette Cooper, Secretary of State for Foreign and Commonwealth Affairs\r\nAgency executive Anne Keast-Butler, Director of GCHQ\r\nChild agencies\r\nNational Cyber Security Centre\r\nComposite Signals Organisation\r\nWebsite www.gchq.gov.uk\r\nFootnotes\r\nGovernment Communications Headquarters (GCHQ) is an intelligence and security organisation responsible\r\nfor providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces\r\nof the United Kingdom.\r\n[2]\r\n Primarily based at The Doughnut in the suburbs of Cheltenham, GCHQ is the\r\nresponsibility of the country's Secretary of State for Foreign and Commonwealth Affairs (Foreign Secretary), but\r\nit is not a part of the Foreign Office and its director ranks as a Permanent Secretary.\r\nGCHQ was originally established after the First World War as the Government Code and Cypher School\r\n(GC\u0026CS)[3] and was known under that name until 1946. During the Second World War it was located at Bletchley\r\nPark, where it was responsible for breaking the German Enigma codes. There are two main components of\r\nGCHQ, the Composite Signals Organisation (CSO), which is responsible for gathering information, and the\r\nNational Cyber Security Centre (NCSC), which is responsible for securing the UK's own communications. The\r\nJoint Technical Language Service (JTLS) is a small department and cross-government resource responsible for\r\nmainly technical language support and translation and interpreting services across government departments. It is\r\nco-located with GCHQ for administrative purposes.\r\nIn 2013, GCHQ received considerable media attention when the former National Security Agency contractor\r\nEdward Snowden revealed that the agency was in the process of collecting all online and telephone data in the UK\r\nvia the Tempora programme.[4] Snowden's revelations began a spate of ongoing disclosures of global surveillance.\r\nThe Guardian newspaper was forced to destroy computer hard drives with the files Snowden had given them\r\nbecause of the threats of a lawsuit under the Official Secrets Act.[5] In June 2014, The Register reported that the\r\ninformation the government sought to suppress by destroying the hard drives related to the location of a \"beyond\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 2 of 21\n\ntop secret\" GCHQ internet monitoring base in Seeb, Oman, and the close involvement of BT and Cable \u0026\r\nWireless in intercepting internet communications.[6]\r\nGCHQ is led by the director of GCHQ, Anne Keast-Butler, and a corporate board, made up of executive and non-executive directors. Reporting to the Corporate Board are:[7][8]\r\nSigint missions: comprising maths and cryptanalysis, IT and computer systems, linguistics and translation,\r\nand the intelligence analysis unit\r\nEnterprise: comprising applied research and emerging technologies, corporate knowledge and information\r\nsystems, commercial supplier relationships, and biometrics\r\nCorporate management: enterprise resource planning, human resources, internal audit, and architecture\r\nNational Cyber Security Centre (NCSC).[9]\r\nDuring the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b\r\nand NID25 (initially known as Room 40) respectively.\r\n[10][11]\r\nIn 1919, the Cabinet's Secret Service Committee, chaired by Lord Curzon, recommended that a peacetime\r\ncodebreaking agency should be created, a task which was given to the Director of Naval Intelligence, Hugh\r\nSinclair.\r\n[12]\r\n Sinclair merged staff from NID25 and MI1b into the new organisation, which initially consisted of\r\naround 25–30 officers and a similar number of clerical staff.[13] It was titled the \"Government Code and Cypher\r\nSchool\" (GC\u0026CS), a cover-name which was chosen by Victor Forbes of the Foreign Office.\r\n[14]\r\n Alastair\r\nDenniston, who had been a member of NID25, was appointed as its operational head.[12] It was initially under the\r\ncontrol of the Admiralty and located in Watergate House, Adelphi, London.[12] Its public function was \"to advise\r\nas to the security of codes and cyphers used by all Government departments and to assist in their provision\", but\r\nalso had a secret directive to \"study the methods of cypher communications used by foreign powers\".[15] GC\u0026CS\r\nofficially formed on 1 November 1919,[16] and produced its first decrypt prior to that date, on 19 October.\r\n[12]\r\nAllidina Visram school in Mombasa, pictured above in 2006, was the location of the British\r\n\"Kilindini\" codebreaking outpost during World War II.\r\nBefore the Second World War, GC\u0026CS was a relatively small department. By 1922, the main focus of GC\u0026CS\r\nwas on diplomatic traffic, with \"no service traffic ever worth circulating\"[17] and so, at the initiative of Lord\r\nCurzon, it was transferred from the Admiralty to the Foreign Office.\r\n[18]\r\n GC\u0026CS came under the supervision of\r\nHugh Sinclair, who by 1923 was both the Chief of SIS and Director of GC\u0026CS.[12] In 1925, both organisations\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 3 of 21\n\nwere co-located on different floors of Broadway Buildings, opposite St. James's Park.\r\n[12]\r\n Messages decrypted by\r\nGC\u0026CS were distributed in blue-jacketed files that became known as \"BJs\".[19] In the 1920s, GC\u0026CS was\r\nsuccessfully reading Soviet Union diplomatic cyphers. However, in May 1927, during a row over clandestine\r\nSoviet support for the General Strike and the distribution of subversive propaganda, Prime Minister Stanley\r\nBaldwin made details from the decrypts public.[20]\r\nDuring the Second World War, GC\u0026CS was based largely at Bletchley Park, in present-day Milton Keynes,\r\nworking on understanding the German Enigma machine and Lorenz ciphers.\r\n[21]\r\n In 1940, GC\u0026CS was working on\r\nthe diplomatic codes and ciphers of 26 countries, tackling over 150 diplomatic cryptosystems.[22] Senior staff\r\nincluded Alastair Denniston, Oliver Strachey, Dilly Knox, John Tiltman, Edward Travis, Ernst Fetterlein, Josh\r\nCooper, Donald Michie, Alan Turing, Gordon Welchman, Joan Clarke, Max Newman, William Tutte, I. J. (Jack)\r\nGood, Peter Calvocoressi and Hugh Foss.\r\n[23]\r\n The 1943 British–US Communication Intelligence Agreement,\r\nBRUSA, connected the signal intercept networks of the GC\u0026CS and the US National Security Agency (NSA).[24]\r\n[25]\r\n Equipment used to break enemy codes included the Colossus computer.\r\n[26]\r\n Colossus consisted of ten\r\nnetworked computers.[27]\r\nAn outstation in the Far East, the Far East Combined Bureau, was set up in Hong Kong in 1935 and moved to\r\nSingapore in 1939. Subsequently, with the Japanese advance down the Malay Peninsula, the Army and RAF\r\ncodebreakers went to the Wireless Experimental Centre in Delhi, India. The Navy codebreakers in FECB went to\r\nColombo, Ceylon, then to Kilindini, near Mombasa, Kenya.[28]\r\nPost Second World War\r\n[edit]\r\nGC\u0026CS was renamed the Government Communications Headquarters (GCHQ) in June 1946.[29]\r\nThe organisation was at first based in Eastcote in northwest London, then in 1951[30] moved to the outskirts of\r\nCheltenham, setting up two sites at Oakley and Benhall. One of the major reasons for selecting Cheltenham was\r\nthat the town had been the location of the headquarters of the United States Army Services of Supply for the\r\nEuropean Theater during the War, which built up a telecommunications infrastructure in the region to carry out its\r\nlogistics tasks.[31]\r\nFollowing the Second World War, US and British intelligence have shared information as part of the UKUSA\r\nAgreement. The principal aspect of this is that GCHQ and its US equivalent, the National Security Agency (NSA),\r\nshare technologies, infrastructure and information.[32][9]\r\nGCHQ ran many signals intelligence (SIGINT) monitoring stations abroad. During the early Cold War, the\r\nremnants of the British Empire provided a global network of ground stations which were a major contribution to\r\nthe UKUSA Agreement; the US regarded RAF Little Sai Wan in Hong Kong as the most valuable of these. The\r\nmonitoring stations were largely run by inexpensive National Service recruits, but when this ended in the early\r\n1960s, the increased cost of civilian employees caused budgetary problems. In 1965 a Foreign Office review\r\nfound that 11,500 staff were involved in SIGINT collection (8,000 GCHQ staff and 3,500 military personnel),\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 4 of 21\n\nexceeding the size of the Diplomatic Service. Reaction to the Suez War led to the eviction of GCHQ from several\r\nof its best foreign SIGINT collection sites, including the new Perkar, Ceylon site and RAF Habbaniya, Iraq. The\r\nstaff largely moved to tented encampments on military bases in Cyprus, which later became the Sovereign Base\r\nArea.\r\n[33]\r\nDuring the Cuban Missile Crisis, GCHQ Scarborough intercepted radio communications from Soviet ships\r\nreporting their positions and used that to establish where they were heading. A copy of the report was sent directly\r\nto the White House Situation Room, providing initial indications of Soviet intentions with regards the US naval\r\nblockade of Cuba.[34]\r\nDuncan Campbell and Mark Hosenball revealed the existence of GCHQ in 1976 in an article for Time Out; as a\r\nresult, Hosenball was deported from the UK.[35][36] GCHQ had a very low profile in the media until 1983 when\r\nthe trial of Geoffrey Prime, a KGB mole within it, created considerable media interest.[37]\r\nTrade union disputes\r\n[edit]\r\nNUCPS banner on march in Cheltenham 1992\r\nIn 1984, GCHQ was the centre of a political row when, in the wake of strikes which affected Sigint collection, the\r\nConservative government of Margaret Thatcher prohibited its employees from belonging to a trade union,\r\nasserting that membership of a union was in conflict with national security.\r\n[9]\r\n The government offered £1,000 to\r\neach employee who agreed to give up their right to union membership. Following the breakdown of talks and the\r\nfailure to negotiate a no-strike agreement, a number of mass national one-day strikes were held to protest against\r\nthis decision, believed by some to be the first step to wider bans on trade unions. Appeals to British courts and the\r\nEuropean Commission of Human Rights[38] were unsuccessful. An appeal to the International Labour\r\nOrganization resulted in a decision that the government's actions were in violation of Freedom of Association and\r\nProtection of the Right to Organise Convention.\r\n[39]\r\nA no-strike agreement was eventually negotiated and the ban lifted by the incoming Labour government in 1997,\r\nwith the Government Communications Group of the Public and Commercial Services Union (PCS) being formed\r\nto represent interested employees at all grades.[40][9] In 2000, a group of 14 former GCHQ employees, who had\r\nbeen dismissed after refusing to give up their union membership, were offered re-employment, which three of\r\nthem accepted.[41]\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 5 of 21\n\nThe legal case Council of Civil Service Unions v Minister for the Civil Service is significant beyond the dispute,\r\nand even beyond trade union law, in that it held for the first time that the royal prerogative is generally subject to\r\njudicial review, although the House of Lords ruled in favour of the Crown in this instance on grounds of national\r\nsecurity.\r\n[42]\r\n1990s: Post–Cold War restructuring\r\n[edit]\r\nThe Intelligence Services Act 1994 formalised the activities of the intelligence agencies for the first time, defining\r\ntheir purpose, and the British Parliament's Intelligence and Security Committee was given a remit to examine the\r\nexpenditure, administration and policy of the three intelligence agencies.[43] The objectives of GCHQ were\r\ndefined as working as \"in the interests of national security, with particular reference to the defence and foreign\r\npolicies of Her Majesty's government; in the interests of the economic wellbeing of the United Kingdom; and in\r\nsupport of the prevention and the detection of serious crime\".[44] During the introduction of the Intelligence\r\nAgency Act in late 1993, the former Prime Minister Jim Callaghan had described GCHQ as a \"full-blown\r\nbureaucracy\", adding that future bodies created to provide oversight of the intelligence agencies should\r\n\"investigate whether all the functions that GCHQ carries out today are still necessary.\"[45]\r\nIn late 1993 civil servant Michael Quinlan advised a deep review of the work of GCHQ following the conclusion\r\nof his \"Review of Intelligence Requirements and Resources\", which had imposed a 3% cut on the agency.\r\n[46]\r\n The\r\nChief Secretary to the Treasury, Jonathan Aitken, subsequently held face to face discussions with the intelligence\r\nagency directors to assess further savings in the wake of Quinlan's review. Aldrich (2010) suggests that Sir John\r\nAdye, the then Director of GCHQ performed badly in meetings with Aitken, leading Aitken to conclude that\r\nGCHQ was \"suffering from out-of-date methods of management and out-of-date methods for assessing priorities\".\r\n[47]\r\n GCHQ's budget was £850 million in 1993 (£1.83 billion as of 2025)[48] compared to £125 million for the\r\nSecurity Service and SIS (MI5 and MI6). In December 1994 the businessman Roger Hurn was commissioned to\r\nbegin a review of GCHQ, which was concluded in March 1995.[49] Hurn's report recommended a cut of £100 \r\nmillion in GCHQ's budget; such a large reduction had not been suffered by any British intelligence agency since\r\nthe end of World War II.[49] The J Division of GCHQ, which had collected SIGINT on Russia, disappeared as a\r\nresult of the cuts.[49] The cuts had been mostly reversed by 2000 in the wake of threats from violent non-state\r\nactors, and risks from increased terrorism, organised crime and illegal access to nuclear, chemical and biological\r\nweapons.[50]\r\nDavid Omand became the Director of GCHQ in 1996, and greatly restructured the agency in the face of new and\r\nchanging targets and rapid technological change.[51] Omand introduced the concept of \"Sinews\" (or \"SIGINT\r\nNew Systems\") which allowed more flexible working methods, avoiding overlaps in work by creating fourteen\r\ndomains, each with a well-defined working scope.[51] The tenure of Omand also saw the construction of a modern\r\nnew headquarters, intended to consolidate the two old sites at Oakley and Benhall into a single, more open-plan\r\nwork environment.[51] Located on a 176-acre site in Benhall, it would be the largest building constructed for\r\nsecret intelligence operations outside the United States.[52][9]\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 6 of 21\n\nOperations at GCHQ's Chung Hom Kok listening station in Hong Kong ended in 1994.[53]\r\n GCHQ's Hong Kong\r\noperations were extremely important to their relationship with the NSA, who contributed investment and\r\nequipment to the station. In anticipation of the transfer of Hong Kong to the Chinese government in 1997, the\r\nHong Kong stations operations were moved to Australian Defence Satellite Communications Station in Geraldton\r\nin Western Australia.\r\n[54]\r\nOperations that used GCHQ's intelligence-gathering capabilities in the 1990s included the monitoring of\r\ncommunications of Iraqi soldiers in the Gulf War, of dissident republican terrorists and the Real IRA, of the\r\nvarious factions involved in the Yugoslav Wars, and of the criminal Kenneth Noye.\r\n[50][54][55]\r\n In the mid-1990s\r\nGCHQ began to assist in the investigation of cybercrime.\r\n[56]\r\n2000s: Coping with the Internet\r\n[edit]\r\nAt the end of 2003, GCHQ moved in to its new building. Built on a circular plan around a large central courtyard,\r\nit quickly became known as the Doughnut. At the time, it was one of the largest public-sector building projects in\r\nEurope, with an estimated cost of £337 million. The new building, which was designed by Gensler and\r\nconstructed by Carillion, became the base for all of GCHQ's Cheltenham operations.[57]\r\nThe public spotlight fell on GCHQ in late 2003 and early 2004 following the sacking of Katharine Gun after she\r\nleaked to The Observer a confidential email from agents at the United States' National Security Agency addressed\r\nto GCHQ officers about the wiretapping of UN delegates in the run-up to the 2003 Iraq war.\r\n[58]\r\nGCHQ gains its intelligence by monitoring a wide variety of communications and other electronic signals. For\r\nthis, a number of stations have been established in the UK and overseas. The listening stations are at Cheltenham\r\nitself, Bude, Scarborough, Ascension Island, and with the United States at RAF Menwith Hill.\r\n[59]\r\n Ayios Nikolaos\r\nStation in Cyprus is run by the British Army for GCHQ.[60]\r\nIn March 2010, GCHQ was criticised by the Intelligence and Security Committee for problems with its IT security\r\npractices and failing to meet its targets for work targeted against cyber attacks.[61]\r\nAs revealed by Edward Snowden in The Guardian, GCHQ spied on foreign politicians visiting the 2009 G-20\r\nLondon Summit by eavesdropping phonecalls and emails and monitoring their computers, and in some cases even\r\nongoing after the summit via keystroke logging that had been undertaken during the summit.[62]\r\nAccording to Edward Snowden, at that time GCHQ had two principal umbrella programs for collecting\r\ncommunications:\r\n\"Mastering the Internet\" (MTI) for Internet traffic, which is extracted from fibre-optic cables and can be\r\nsearched by using the Tempora computer system.\r\n\"Global Telecoms Exploitation\" (GTE) for telephone traffic.[63]\r\nGCHQ has also had access to the US internet monitoring programme PRISM from at least as far back as June\r\n2010.[64] PRISM is said to give the National Security Agency and FBI easy access to the systems of nine of the\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 7 of 21\n\nworld's top internet companies, including Google, Facebook, Microsoft, Apple, Yahoo, and Skype.[65]\r\nFrom 2013, GCHQ realised that public attitudes to Sigint had changed and its former unquestioned secrecy was\r\nno longer appropriate or acceptable. The growing use of the Internet, together with its inherent insecurities, meant\r\nthat the communications traffic of private citizens were becoming inextricably mixed with those of their targets\r\nand openness in the handling of this issue was becoming essential to their credibility as an organisation. The\r\nInternet had become a \"cyber commons\", with its dominance creating a \"second age of Sigint\". GCHQ\r\ntransformed itself accordingly, including greatly expanded Public Relations and Legal departments, and adopting\r\npublic education in cyber security as an important part of its remit.[66]\r\n2010s: Disinformation, discord and division\r\n[edit]\r\nIn February 2014, The Guardian, based on documents provided by Snowden, revealed that GCHQ had\r\nindiscriminately collected 1.8 million private Yahoo webcam images from users across the world.[67] In the same\r\nmonth NBC and The Intercept, based on documents released by Snowden, revealed the Joint Threat Research\r\nIntelligence Group and the Computer Network Exploitation units within GCHQ. Their mission was cyber\r\noperations based on \"dirty tricks\" to shut down enemy communications, discredit, and plant misinformation on\r\nenemies.[68] These operations were 5% of all GCHQ operations according to a conference slideshow presented by\r\nthe GCHQ.[69]\r\nSoon after becoming Director of GCHQ in 2014, Robert Hannigan wrote an article in the Financial Times on the\r\ntopic of internet surveillance, stating that \"however much [large US technology companies] may dislike it, they\r\nhave become the command and control networks of choice for terrorists and criminals\" and that GCHQ and its\r\nsister agencies \"cannot tackle these challenges at scale without greater support from the private sector\", arguing\r\nthat most internet users \"would be comfortable with a better and more sustainable relationship between the\r\n[intelligence] agencies and the tech companies\". Since the 2013 global surveillance disclosures, large US\r\ntechnology companies have improved security and become less co-operative with foreign intelligence agencies,\r\nincluding those of the UK, generally requiring a US court order before disclosing data.[70][71] However the head\r\nof the UK technology industry group techUK rejected these claims, stating that they understood the issues but that\r\ndisclosure obligations \"must be based upon a clear and transparent legal framework and effective oversight rather\r\nthan, as suggested, a deal between the industry and government\".[72]\r\nIn 2015, documents obtained by The Intercept from US National Security Agency whistleblower Edward\r\nSnowden revealed that GCHQ had carried out a mass-surveillance operation, codenamed KARMA POLICE, since\r\nabout 2008.[73] The operation swept up the IP address of Internet users visiting websites, and was established with\r\nno public scrutiny or oversight. KARMA POLICE is a powerful spying tool in conjunction with other GCHQ\r\nprograms because IP addresses could be cross-referenced with other data.[73] The goal of the program, according\r\nto the documents, was \"either (a) a web browsing profile for every visible user on the internet, or (b) a user profile\r\nfor every visible website on the internet.\"[73]\r\nIn 2015, GCHQ admitted for the first time in court that it conducts computer hacking.[74]\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 8 of 21\n\nIn 2017, US Press Secretary Sean Spicer made allegations that GCHQ had conducted surveillance on US\r\nPresident Donald Trump. These unfounded claims were based on statements made during an opinion piece in a\r\nFOX media segment.[75][76] The US government formally apologised for the unfounded allegations and promised\r\nthey would not be repeated.[77][78][79]\r\nBritish intelligence did gather information relating to Russian contacts made by Trump's campaign team in the\r\nrun-up to his election, which were passed on to US intelligence agencies.[80][81]\r\nOn 31 October 2018, GCHQ joined Instagram.\r\n[82][83]\r\nGCHQ personnel are recognised annually by King Charles III (formerly the Prince of Wales) at the Prince of\r\nWales's Intelligence Community Awards at St James's Palace or Clarence House alongside members of the\r\nSecurity Service (MI5), and Secret Intelligence Service (MI6).[84] Awards and citations are given to teams within\r\nthe agencies as well as individuals.[84]\r\nAs well as a mission to gather intelligence, GCHQ has for a long time had a corresponding mission to assist in the\r\nprotection of the British government's own communications. When the Government Code and Cypher School\r\n(GC\u0026CS) was created in 1919, its overt task was providing security advice.[85] GC\u0026CS's Security section was\r\nlocated in Mansfield College, Oxford during the Second World War.\r\n[85]\r\nIn April 1946, GC\u0026CS became GCHQ, and the now GCHQ Security section moved from Oxford to join the rest\r\nof the organisation at Eastcote later that year.\r\n[85]\r\nFrom 1952 to 1954, the intelligence mission of GCHQ relocated to Cheltenham; the Security section remained at\r\nEastcote,[85] and in March 1954 became a separate, independent organisation: the London Communications\r\nSecurity Agency (LCSA),[85] which in 1958 was renamed to the London Communications-Electronic Security\r\nAgency (LCESA).[85]\r\nIn April 1965, GPO and MOD units merged with LCESA to become the Communications-Electronic Security\r\nDepartment (CESD).[85]\r\nIn October 1969, CESD was merged into GCHQ and becoming Communications-Electronic Security Group\r\n(CESG).[85]\r\nIn 1977 CESG relocated from Eastcote to Cheltenham.[85]\r\nCESG continued as the UK National Technical Authority for information assurance, including cryptography.\r\nCESG did not manufacture security equipment, but worked with industry to ensure the availability of suitable\r\nproducts and services, while GCHQ itself funded research into such areas, for example to the Centre for Quantum\r\nComputation at Oxford University and the Heilbronn Institute for Mathematical Research at the University of\r\nBristol.\r\n[86]\r\nIn the 21st century, CESG ran a number of assurance schemes such as CHECK, CLAS, Commercial Product\r\nAssurance (CPA) and CESG Assisted Products Service (CAPS).[87]\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 9 of 21\n\nPublic key encryption\r\n[edit]\r\nIn 1970 the concept for public-key encryption (public key infrastructure) was developed and proven by GCHQ's\r\nJames H. Ellis. Ellis lacked the number theory skills required to build a workable system. In 1974 GCHQ\r\nmathematician Clifford Cocks had developed a workable public key cryptography algorithm and a workable PKI\r\nsystem. Cocks's system was not available in the public domain until it was declassified in 1997.[88][89]\r\nBy 1997 broader public key cryptography commercial technologies had been independently developed and had\r\nbecome well established, in areas such as email security, digital signatures, and TLS (a fundamental TCP/IP\r\nsecurity component) etc.[90] Most notably in 1977 the RSA algorithm had been developed (equivalent to Cocks's\r\nsystem) and by 1997 was extremely well established.[91]\r\nIn 2016, the National Cyber Security Centre was established under GCHQ but located in London, as the UK's\r\nauthority on cybersecurity. It absorbed and replaced CESG as well as activities that had previously existed outside\r\nGCHQ: the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the\r\ncyber-related responsibilities of the Centre for the Protection of National Infrastructure (CPNI).[92]\r\nJoint Technical Language Service\r\n[edit]\r\nThe Joint Technical Language Service (JTLS) was established in 1955,[93] drawing on members of the small\r\nMinistry of Defence technical language team and others, initially to provide standard English translations for\r\norganisational expressions in any foreign language, discover the correct English equivalents of technical terms in\r\nforeign languages and discover the correct expansions of abbreviations in any language.[94] The remit of the JTLS\r\nhas expanded in the ensuing years to cover technical language support and interpreting and translation services\r\nacross the UK Government and to local public sector services in Gloucestershire and surrounding counties. The\r\nJTLS also produces and publishes foreign language working aids under crown copyright and conducts research\r\ninto machine translation and on-line dictionaries and glossaries. The JTLS is co-located with GCHQ for\r\nadministrative purposes.[95]\r\nInternational relationships\r\n[edit]\r\nGCHQ operates in partnership with equivalent agencies worldwide in a number of bi-lateral and multi-lateral\r\nrelationships. The principal of these is with the United States (National Security Agency), Canada\r\n(Communications Security Establishment), Australia (Australian Signals Directorate) and New Zealand\r\n(Government Communications Security Bureau), through the mechanism of the UK-US Security Agreement, a\r\nbroad intelligence-sharing agreement encompassing a range of intelligence collection methods. Relationships are\r\nalleged to include shared collection methods, such as the system described in the popular media as ECHELON, as\r\nwell as analysed product.[96]\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 10 of 21\n\nGCHQ's legal basis is established by the Intelligence Services Act 1994 Section 3 as follows:\r\n(1) There shall continue to be a Government Communications Headquarters under the authority\r\nof the Secretary of State; and, subject to subsection (2) below, its functions shall be—\r\n(a) to monitor or interfere with electromagnetic, acoustic and other emissions and any\r\nequipment producing such emissions and to obtain and provide information derived from\r\nor related to such emissions or equipment and from encrypted material; and\r\n(b) to provide advice and assistance about—\r\n(i) languages, including terminology used for technical matters, and\r\n(ii) cryptography and other matters relating to the protection of information and\r\nother material, to the armed forces of the Crown, to Her Majesty's Government in\r\nthe United Kingdom or to a Northern Ireland Department or to any other\r\norganisation which is determined for the purposes of this section in such manner\r\nas may be specified by the Prime Minister.\r\n(2) The functions referred to in subsection (1)(a) above shall be exercisable only—\r\n(a) in the interests of national security, with particular reference to the defence and\r\nforeign policies of His Majesty's Government in the United Kingdom; or\r\n(b) in the interests of the economic well-being of the United Kingdom in relation to the\r\nactions or intentions of persons outside the British Islands; or\r\n(c) in support of the prevention or detection of serious crime.\r\n(3) In this Act, the expression \"GCHQ\" refers to the Government Communications Headquarters\r\nand to any unit or part of a unit of the armed forces of the Crown which is for the time being\r\nrequired by the Secretary of State to assist the Government Communications Headquarters in\r\ncarrying out its functions.[44]\r\nActivities that involve interception of communications are permitted under the Regulation of Investigatory Powers\r\nAct 2000; this kind of interception can only be carried out after a warrant has been issued by a Secretary of State.\r\nThe Human Rights Act 1998 requires the intelligence agencies, including GCHQ, to respect citizens' rights as\r\ndescribed in the European Convention on Human Rights.\r\n[97][98][99]\r\nThe Prime Minister nominates cross-party Members of Parliament to an Intelligence and Security Committee. The\r\nremit of the Committee includes oversight of intelligence and security activities and reports are made directly to\r\nParliament.[43] Its functions were increased under the Justice and Security Act 2013 to provide for further access\r\nand investigatory powers.[100]\r\nJudicial oversight of GCHQ's conduct is exercised by the Investigatory Powers Tribunal.\r\n[101]\r\n The UK also has an\r\nindependent Intelligence Services Commissioner and Interception of Communications Commissioner, both of\r\nwhom are former senior judges.[102]\r\nThe Investigatory Powers Tribunal ruled in December 2014 that GCHQ does not breach the European Convention\r\non Human Rights, and that its activities are compliant with Articles 8 (right to privacy) and 10 (freedom of\r\nexpression) of the European Convention on Human Rights.[98] However, the Tribunal stated in February 2015 that\r\none particular aspect, the data-sharing arrangement that allowed UK Intelligence services to request data from the\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 11 of 21\n\nUS surveillance programmes Prism and Upstream, had been in contravention of human rights law prior to this\r\nuntil two paragraphs of additional information, providing details about the procedures and safeguards, were\r\ndisclosed to the public in December 2014.[103][104][105]\r\nFurthermore, the IPT ruled that the legislative framework in the United Kingdom does not permit mass\r\nsurveillance and that while GCHQ collects and analyses data in bulk, it does not practice mass surveillance.[98]\r\n[106][107]\r\n This complements independent reports by the Interception of Communications Commissioner,\r\n[108]\r\n and a\r\nspecial report made by the Intelligence and Security Committee of Parliament; although several shortcomings and\r\npotential improvements to both oversight and the legislative framework were highlighted.[109]\r\nDespite the inherent secrecy around much of GCHQ's work, investigations carried out by the UK government\r\nafter the Snowden disclosures have admitted various abuses by the security services. A report by the Intelligence\r\nand Security Committee (ISC) in 2015 revealed that a small number of staff at UK intelligence agencies had been\r\nfound to misuse their surveillance powers, in one case leading to the dismissal of a member of staff at GCHQ,\r\nalthough there were no laws in place at the time to make these abuses a criminal offence.[110]\r\nLater that year, a ruling by the Investigatory Powers Tribunal found that GCHQ acted unlawfully in conducting\r\nsurveillance on two human rights organisations. The closed hearing found the government in breach of its internal\r\nsurveillance policies in accessing and retaining the communications of the Egyptian Initiative for Personal Rights\r\nand the Legal Resources Centre in South Africa. This was only the second time in the IPT's history that it had\r\nmade a positive determination in favour of applicants after a closed session.[111]\r\nAt another IPT case in 2015, GCHQ conceded that \"from January 2010, the regime for the interception/obtaining,\r\nanalysis, use, disclosure and destruction of legally privileged material has not been in accordance with the law for\r\nthe purposes of Article 8(2) of the European convention on human rights and was accordingly unlawful\".[112] This\r\nadmission was made in connection with a case brought against them by Abdelhakim Belhaj, a Libyan opponent of\r\nthe Gaddafi regime, and his wife Fatima Bouchard. The couple had accused the British government of\r\nparticipating in the regime's abduction of them to Libya in March 2004.[113]\r\nOn 25 May 2021, the European Court of Human Rights (ECHR) ruled that the GCHQ is guilty of violating data\r\nprivacy rules through their bulk interception of communications, and does not provide sufficient protections for\r\nconfidential journalistic material because it gathers communications in bulk.[114]\r\nSurveillance of parliamentarians\r\n[edit]\r\nIn 2015 there was a complaint by Green Party MP Caroline Lucas that British intelligence services, including\r\nGCHQ, had been spying on MPs allegedly \"in defiance of laws prohibiting it.\"[115]\r\nThen-Home Secretary, Theresa May, had told Parliament in 2014 that:\r\nObviously, the Wilson Doctrine applies to parliamentarians. It does not absolutely exclude the use of\r\nthese powers against parliamentarians, but it sets certain requirements for those powers to be used in\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 12 of 21\n\nrelation to a parliamentarian. It is not the case that parliamentarians are excluded and nobody else in the\r\ncountry is, but there is a certain set of rules and protocols that have to be met if there is a requirement to\r\nuse any of these powers against a parliamentarian.[116]\r\nThe Investigatory Powers Tribunal investigated the complaint, and ruled that contrary to the allegation, there was\r\nno law that gave the communications of Parliament any special protection.[117] The Wilson Doctrine merely acts\r\nas a political convention.\r\n[118]\r\nConstitutional legal case\r\n[edit]\r\nA controversial GCHQ case determined the scope of judicial review of prerogative powers (the Crown's residual\r\npowers under common law). This was Council of Civil Service Unions v Minister for the Civil Service [1985] AC\r\n374 (often known simply as the \"GCHQ case\"). In this case, a prerogative Order in Council had been used by the\r\nprime minister (who is the Minister for the Civil Service) to ban trade union activities by civil servants working at\r\nGCHQ. This order was issued without consultation. The House of Lords had to decide whether this was\r\nreviewable by judicial review. It was held that executive action is not immune from judicial review simply\r\nbecause it uses powers derived from common law rather than statute (thus the prerogative is reviewable).[119]\r\nThe following is a list of the heads and operational heads of GCHQ and GC\u0026CS:\r\nSir Hugh Sinclair (1919–1939) (founder)\r\nCmdr Alastair Denniston (1921–February 1942) (operational head)\r\nSir Edward Travis (February 1942 – 1952)\r\nSir Eric Jones (April 1952 – 1960)\r\nSir Clive Loehnis (1960–1964)\r\nSir Leonard Hooper (1965–1973)\r\nSir Arthur Bonsall (1973–1978)\r\nSir Brian John Maynard Tovey (1978–1983)\r\nSir Peter Marychurch (1983–1989)\r\nSir John Anthony Adye (1989–1996)\r\nSir David Omand (1996 –1997)\r\nSir Kevin Tebbit (1998)\r\nSir Francis Richards (1998–2003)\r\nSir David Pepper (2003–2008)\r\nSir Iain Lobban (2008–2014)\r\nRobert Hannigan (2014–2017)\r\nSir Jeremy Fleming (2017–2023)\r\nAnne Keast-Butler (2023–Present)\r\nStations and former stations\r\n[edit]\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 13 of 21\n\nThe following are stations and former stations that have operated since the Cold War.\r\n[120][121]\r\nIn the historical drama film The Imitation Game (2014) Benedict Cumberbatch portrays Alan Turing in his efforts\r\nto break the Enigma code while employed by the Government Code and Cypher School.[122]\r\nGCHQ have set a number of cryptic online challenges to the public, used to attract interest and for recruitment,\r\nstarting in late 1999.[123][124] The response to the 2004 challenge was described as \"excellent\",[125] and the\r\nchallenge set in 2015 had over 600,000 attempts.[126] It also published the GCHQ Puzzle Book in 2016 which sold\r\nmore than 300,000 copies, with the proceeds going to charity. A second book was published in October 2018.[127]\r\nGCHQ appeared in the Doctor Who 2019 special \"Resolution\" where the Reconnaissance Scout Dalek storms the\r\nfacility and exterminates the staff in order to use the organisation's resources to summon a Dalek fleet.[128][129]\r\nGCHQ is the setting of the 2020 Sky One sitcom Intelligence, featuring David Schwimmer as an incompetent\r\nAmerican NSA officer liaising with GCHQ's Cyber Crimes unit.[130]\r\nIn October 2020, intelligence and security expert John Ferris published Behind the Enigma: The Authorised\r\nHistory of GCHQ, Britain's Secret Cyber-Intelligence Agency.\r\n[131]\r\nGCHQ is the setting of the 2022 Channel 4 drama The Undeclared War. Set in the near future, it depicts a work\r\nexperience student at the government agency during a cyberattack on the UK and the implications.[132]\r\nGCHQ units:\r\nJoint Operations Cell\r\nNational Cyber Security Centre\r\nGCHQ specifics:\r\nCapenhurst – said to be home to a GCHQ monitoring site in the 1990s\r\nHugh Alexander – head of the cryptanalysis division at GCHQ from 1949 to 1971\r\nOperation Socialist, a 2010–2013 operation in Belgium\r\nZircon, the cancelled 1980s GCHQ satellite project\r\nUK agencies:\r\nBritish intelligence agencies\r\nJoint Forces Intelligence Group\r\nRAF Intelligence\r\nUK cyber security community\r\nElsewhere:\r\nSignals intelligence by alliances, nations and industries\r\nNSA – equivalent United States organisation\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 14 of 21\n\n1. ^ Jump up to: a\r\n \r\nb\r\n \"Intelligence and Security Committee of Parliament \"Annual Report 2021–2022\"\" (PDF).\r\nArchived (PDF) from the original on 23 December 2022. Retrieved 20 December 2022.\r\n2. ^ GCHQ – Welcome to GCHQ (Archived 22 October 2014 at the Wayback Machine), Government of the\r\nUnited Kingdom. Retrieved 7 July 2014.\r\n3. ^ Headrick, Daniel R. (1991) The invisible Weapon: Telecommunications and International Politics 1851-\r\n1945, Oxford UP p219\r\n4. ^ \"A simple guide to GCHQ's internet surveillance programme Tempora\". Wired UK. 24 June 2013.\r\nArchived from the original on 15 May 2016. Retrieved 29 August 2017.\r\n5. ^ Borger, Julian (21 August 2013). \"NSA files: why the Guardian in London destroyed hard drives of\r\nleaked files\". The Guardian. Archived from the original on 4 February 2017. Retrieved 27 May 2018.\r\n6. ^ Campbell, Duncan (3 June 2014). \"Revealed: GCHQ's beyond top secret middle eastern internet spy\r\nbase\". The Register. Archived from the original on 25 June 2014. Retrieved 16 September 2017.\r\n7. ^ Aldrich 2010, p. 565.\r\n8. ^ (secondary) Leong, Angela (2007). The Disruption of International Organised Crime: An Analysis of\r\nLegal and Non-Legal Strategies. Ashgate Publishing. ISBN 978-0-7546-7066-7. Retrieved 19 April 2012.\r\n9. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n Ferris (2020)\r\n10. ^ Gannon, Paul (2011). Inside Room 40: The Codebreakers of World War I. Ian Allan Publishing.\r\nISBN 978-0-7110-3408-2.\r\n11. ^ Johnson, 1997, p. 27\r\n12. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n Johnson, 1997, p. 44\r\n13. ^ Johnson, 1997, p. 45 and Kahn, 1991, p. 82; these sources give different numbers for the initial size of\r\nthe GC\u0026CS staff\r\n14. ^ Macksey, Kenneth (2003). The Searchers: How Radio Interception Changed the Course of Both World\r\nWars. Cassell Military. p. 58. ISBN 0-304-36545-9.\r\n15. ^ Smith, 2001, pp. 16–17\r\n16. ^ Kahn, 1991, p. 82\r\n17. ^ Denniston, Alastair G. (1986). \"The Government Code and Cypher School Between the Wars\".\r\nIntelligence and National Security. 1 (1): 48–70. doi:10.1080/02684528608431841.\r\n18. ^ Smith, 2001, pp. 20–21\r\n19. ^ Smith, 2001, pp. 18–19\r\n20. ^ Aldrich 2010, p. 18.\r\n21. ^ Gannon, Paul (2006). Colossus: Bletchley Park's Greatest Secret. Atlantic Books. ISBN 978-1-84354-\r\n331-2.\r\n22. ^ Alvarez, David (2001). \"Most Helpful and Cooperative: GC\u0026CS and the Development of American\r\nDiplomatic Cryptanalysis, 1941–1942\". In Smith, Michael; Erskine, Ralph (eds.). Action This Day:\r\nBletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer. Bantam Press.\r\nISBN 978-0593049105.\r\n23. ^ Erskine, Ralph; Smith, Michael, eds. (2011), The Bletchley Park Codebreakers, Biteback Publishing Ltd,\r\nISBN 978-1-84954-078-0\r\n24. ^ \"How the British and Americans started listening in\". BBC News. 8 February 2016. Archived from the\r\noriginal on 2 April 2023. Retrieved 2 April 2023.\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 15 of 21\n\n25. ^ \"Diary reveals birth of secret UK-US spy pact that grew into Five Eyes\". BBC News. 5 March 2021.\r\nArchived from the original on 2 April 2023. Retrieved 2 April 2023.\r\n26. ^ Preneel, Bart, ed. (2000), \"Colossus and the German Lorenz Cipher – Code Breaking in WW II\" (PDF),\r\nAdvances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of\r\nCryptographic Techniques Bruges, Belgium May 14-18, 2000, Proceedings, Lecture Notes in Computer\r\nScience, vol. 1807, Springer, p. 417, doi:10.1007/3-540-45539-6_29, ISBN 978-3540675174, archived\r\n(PDF) from the original on 20 November 2008\r\n27. ^ McCallum, Shiona (17 January 2024). \"Unseen images of code breaking computer that helped win\r\nWW2\". BBC. Retrieved 21 January 2024.\r\n28. ^ \"Mombasa was base for high-level UK espionage operation\". Coastweek. Archived from the original on\r\n15 May 2013. Retrieved 25 February 2018.\r\n29. ^ Smith, Michael (1998). Station X. Channel 4 books. p. 176. ISBN 0-330-41929-3.\r\n30. ^ \"History of GCHQ Cheltenham\". GCHQ website 'About Us' pages. Archived from the original on 5\r\nOctober 2006. Retrieved 29 June 2006.\r\n31. ^ Dormon, Bob (24 May 2013). \"INSIDE GCHQ: Welcome to Cheltenham's cottage industry\". The\r\nRegister. Archived from the original on 6 September 2021. Retrieved 6 September 2016.\r\n32. ^ Murray, Craig (16 October 2007). Dirty Diplomacy. Scribner. p. 332. ISBN 978-1416548010.\r\n33. ^ Aldrich, Richard J. (2011). GCHQ. London: Harper Press. pp. 117–118, 153, 155, 160–162, 227–228,\r\n475. ISBN 978-0-007312-665. Archived from the original on 4 April 2023. Retrieved 21 March 2023.\r\n34. ^ Corera, Gordon (21 October 2019). \"Scarborough's Cuban missile crisis role revealed\". Archived from\r\nthe original on 5 December 2019. Retrieved 21 October 2019.\r\n35. ^ Duncan Campbell; Mark Hosenball (21 May 1976). \"The Eavesdroppers\" (PDF). Time Out. Archived\r\n(PDF) from the original on 1 November 2013. Retrieved 1 March 2016.\r\n36. ^ Court ruling, \"R v Secretary of State for the Home Department, ex parte Hosenball Archived 21 May\r\n2016 at the Wayback Machine\", [1977] 1 W.L.R. 766; [1977] 3 All E.R. 452. Lord Denning presiding\r\njudge, 29 March 1977.\r\n37. ^ Aldrich 2010, p. 382.\r\n38. ^ \"EComHR Inadmissibility decision of EComHR on application no. 11603/85\". 1987. Archived from the\r\noriginal on 4 June 2012. Retrieved 15 November 2010.\r\n39. ^ \"EComHR Inadmissibility decision of EComHR on application no. 11603/85 – The Facts\". Archived from\r\nthe original on 4 June 2012. Retrieved 15 November 2010. para. IV\r\n40. ^ \"Union representation\". GCHQ website. Archived from the original on 9 May 2006. Retrieved 12 April\r\n2006.\r\n41. ^ \"Sacked GCHQ workers win compensation\". BBC News. 1 February 2000. Archived from the original on\r\n1 September 2017. Retrieved 12 April 2006.\r\n42. ^ McGaughey, Ewan (2019). \"8: Trade Unions\". A Casebook on Labour Law. Hart. p. 360. ISBN 978-1-\r\n84946-931-9.\r\n43. ^ Jump up to: a\r\n \r\nb\r\n \"ISC – About\". Intelligence and Security Committee of Parliament. Archived from the\r\noriginal on 25 December 2010. Retrieved 1 December 2013.\r\n44. ^ Jump up to: a\r\n \r\nb\r\n \"Intelligence Services Act 1994\". The National Archives. Archived from the original on 2\r\nDecember 2013. Retrieved 1 December 2013.\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 16 of 21\n\n45. ^ \"Hansard: December 1993 Intelligence Services Bill\". Parliamentary Debates (Hansard). 9 December\r\n1993. Archived from the original on 19 March 2014. Retrieved 11 March 2014.\r\n46. ^ Aldrich 2010, p. 493.\r\n47. ^ Aldrich 2010, p. 494.\r\n48. ^ UK Consumer Price Index inflation figures from 1209–2024 based on data from \"Inflation calculator\".\r\nBank of England. London. 18 February 2026. Retrieved 1 April 2026.\r\n49. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Aldrich 2010, p. 495\r\n50. ^ Jump up to: a\r\n \r\nb\r\n Aldrich 2010, p. 505\r\n51. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Aldrich 2010, p. 496\r\n52. ^ Aldrich 2010, p. 9.\r\n53. ^ Aldrich 2010, p. 475\r\n54. ^ Jump up to: a\r\n \r\nb\r\n Nigel West (31 August 2012). Historical Dictionary of Signals Intelligence. Scarecrow\r\nPress. pp. 27ff. ISBN 978-0-8108-7391-9.\r\n55. ^ Aldrich 2010, p. 473\r\n56. ^ Aldrich 2010, p. 489\r\n57. ^ \"Carillion set for growth\". BBC News. 19 September 2000. Archived from the original on 27 February\r\n2009. Retrieved 22 December 2007.\r\n58. ^ Aldrich, 2010, p. 521\r\n59. ^ Campbell, Duncan (1981). \"Phone tappers and the state\". New Statesman: 54.\r\n60. ^ Aldrich, 2010, p. 471\r\n61. ^ \"'Cavalier' GCHQ online spy centre loses 35 laptops\". Computerworld UK. 12 March 2010. Retrieved\r\n12 March 2010. {{cite web}} : CS1 maint: deprecated archival service (link)\r\n62. ^ The Guardian: GCHQ intercepted foreign politicians' communications at G20 summits Archived 18\r\nOctober 2013 at the Wayback Machine, 16 June 2013\r\n63. ^ Philip Bump (21 June 2013). \"The UK Tempora Program Captures Vast Amounts of Data – and Shares\r\nwith NSA\". The Atlantic Wire. Archived from the original on 5 November 2013. Retrieved 23 June 2013.\r\n64. ^ \"Statement on GCHQ's Alleged Interception of Communications under the US PRISM Programme\"\r\n(PDF). Intelligence and Security Committee of Parliament. 17 July 2013. Archived (PDF) from the\r\noriginal on 19 April 2023. Retrieved 19 April 2023.\r\n65. ^ \"Scale and significance of NSA snooping claims\". BBC. 11 June 2013. Archived from the original on 17\r\nJune 2015. Retrieved 20 June 2018.\r\n66. ^ Ferris (2020), Chapters 14 and 15.\r\n67. ^ Ackerman, Spencer; Ball, James (28 February 2014). \"Optic Nerve: millions of Yahoo webcam images\r\nintercepted by GCHQ\". The Guardian. Archived from the original on 23 September 2016. Retrieved 2\r\nMarch 2014.\r\n68. ^ \"Snowden Docs: British Spies Used Sex and 'Dirty Tricks'\". NBC News. 7 February 2014. Archived from\r\nthe original on 7 February 2021. Retrieved 7 February 2014.\r\n69. ^ \"The Snowden Files: British Spies Used Sex and 'Dirty' Tricks\" (PDF). NBC News Investigations. NBC.\r\nArchived from the original (PDF) on 12 January 2015. Retrieved 5 April 2015.\r\n70. ^ Robert Hannigan (3 November 2014). \"The web is a terrorist's command-and-control network of\r\nchoice\". Financial Times. Archived from the original on 10 December 2022. Retrieved 3 November 2014.\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 17 of 21\n\n71. ^ Sam Jones and Murad Ahmed (3 November 2014). \"Tech groups aid terror, says UK spy chief\". Financial\r\nTimes. Archived from the original on 10 December 2022. Retrieved 3 November 2014.\r\n72. ^ David Barrett (4 November 2014). \"Tech giants reject GCHQ boss Robert Hannigan's call for deal with\r\ngovernment\". The Daily Telegraph. Archived from the original on 12 January 2022. Retrieved 5 November\r\n2014.\r\n73. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Ryan Gallager, Profiled: From Radio to Porn, British Spies Track Web Users' Online\r\nIdentities Archived 10 September 2021 at the Wayback Machine, The Intercept (25 September 2015).\r\n74. ^ Croft, Jane (1 December 2015) UK spy agency GCHQ admits it carries out computer hacking Archived 3\r\nDecember 2015 at the Wayback Machine. Financial Times\r\n75. ^ Farrell, Henry (16 March 2017) Sean Spicer just suggested that Obama used British intelligence to spy\r\non Trump. Not so much Archived 17 March 2017 at the Wayback Machine. The Washington Post\r\n76. ^ Blake, Aaron (16 March 2017) Sean Spicer's angry, lonely defense of Trump's wiretapping claim,\r\nannotated Archived 17 March 2017 at the Wayback Machine. The Washington Post\r\n77. ^ \"US makes formal apology to Britain after White House accuses GCHQ of wiretapping Trump Tower\".\r\nThe Telegraph. 17 March 2017. Archived from the original on 22 March 2017. Retrieved 17 March 2017.\r\n78. ^ \"White House apologizes to British government over spying claims\". CNN. 17 December 2017. Archived\r\nfrom the original on 18 March 2017. Retrieved 17 March 2017.\r\n79. ^ \"GCHQ dismisses 'utterly ridiculous' claim it helped wiretap Trump | US news\". The Guardian. 17\r\nMarch 2017. Archived from the original on 21 April 2019. Retrieved 13 April 2017.\r\n80. ^ Harding, Luke; Kirchgaessner, Stephanie; Hopkins, Nick (13 April 2017). \"British spies were first to spot\r\nTrump team's links with Russia\". The Guardian. Archived from the original on 13 April 2017. Retrieved 13\r\nApril 2017.\r\n81. ^ \"British intelligence passed Trump associates' communications with Russians on to US counterparts\".\r\nCNN. 14 April 2017. Archived from the original on 15 April 2017. Retrieved 14 April 2017.\r\n82. ^ \"GCHQ (@gchq) • Instagram photos and videos\". www.instagram.com. Archived from the original on 14\r\nMay 2020. Retrieved 1 November 2018.\r\n83. ^ Weaver, Matthew (31 October 2018). \"GCHQ uses Instagram to 'open up world of espionage' to public\".\r\nThe Guardian. Archived from the original on 31 October 2018. Retrieved 1 November 2018.\r\n84. ^ Jump up to: a\r\n \r\nb\r\n Mayer, Catherine (2016). Charles: the Heart of a King. Ebury Publishing. p. 175.\r\nISBN 978-0-7535-5595-8. Retrieved 24 October 2021.\r\n85. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n \r\ng\r\n \r\nh\r\n \r\ni\r\n \"Operational Selection Policy OSP8\" (PDF). Archived (PDF) from the\r\noriginal on 12 June 2011. Retrieved 24 January 2018.\r\n86. ^ \"Heilbronn Institute for Mathematical Research\". University of Bristol. Archived from the original on 22\r\nFebruary 2014. Retrieved 30 August 2008.\r\n87. ^ \"CESG Service Catalogue\". Archived from the original on 20 August 2015. Retrieved 17 August 2015.\r\n88. ^ Singh, Simon. \"Unsung Heroes of Cryptography\". Archived from the original on 5 December 2014.\r\nRetrieved 13 June 2012. (Originally published in The Sunday Telegraph)\r\n89. ^ \"James Ellis\". www.gchq.gov.uk. Retrieved 17 November 2023.\r\n90. ^ \"Introduction to PKI\". www.ncsc.gov.uk. Retrieved 16 November 2023.\r\n91. ^ \"Prehistory of Public Key Cryptography\". www.cs.columbia.edu. Retrieved 16 November 2023.\r\n92. ^ HM Government (1 November 2016). \"National Cyber Security Strategy 2016-2021\" (PDF). gov.uk.\r\np. 29. Archived (PDF) from the original on 1 November 2016. Retrieved 2 November 2016.\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 18 of 21\n\n93. ^ Newmark, Peter (1991). About Translation. Multilingual Matters. p. 40. ISBN 1-85359-118-1.\r\n94. ^ Joint Technical Language Service (1983). Russian-English Military Dictionary (English and\r\nRussian ed.). The Stationery Office. ISBN 9780112300199.\r\n95. ^ \"Government Communications Headquarters, Cheltenham; Joint Technical Language Service\". National\r\nArchives. Archived from the original on 26 February 2018. Retrieved 25 February 2018.\r\n96. ^ Schmid, Gerhard (11 July 2001). \"On the existence of a global system for the interception of private and\r\ncommercial communications (ECHELON interception system) – Temporary Committee on the ECHELON\r\nInterception System, (2001/2098(INI))\" (PDF). European Parliament: Temporary Committee on the\r\nECHELON Interception System. p. 194. Archived (PDF) from the original on 20 September 2001.\r\nRetrieved 27 March 2008.\r\n97. ^ \"The Law\". GCHQ. Archived from the original on 13 January 2020. Retrieved 17 December 2013.\r\n98. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \"GCHQ does not breach human rights, judges rule\". BBC. 5 December 2014. Archived\r\nfrom the original on 7 March 2021. Retrieved 6 December 2014.\r\n99. ^ \"The Andrew Marr Show Interview: Theresa May, MP Home Secretary\" (PDF). BBC. 23 November\r\n2014. Archived (PDF) from the original on 11 December 2014. Retrieved 6 December 2014. “Well I guess\r\nwhat he's talking about is the fact that for certain aspects and certain of the more intrusive measures that\r\nour security service and police have available to them – i.e. Intercept, intercepting people's telephones and\r\nsome other intrusive measures – the decision is taken by the Secretary of State, predominantly me. A\r\nsignificant part of my job is looking at these warrants and signing these warrants. I think it's... Some\r\npeople argue that should be to judges....I think it's very important that actually those decisions are being\r\ntaken by somebody who is democratically accountable to the public. I think that's an important part of our\r\nsystem. I think it's a strength of our system.”\r\n100. ^ \"Justice and Security Act 2013\". Legislation.co.uk. Archived from the original on 8 December 2021.\r\nRetrieved 8 December 2021.\r\n101. ^ \"Functions – Key role\". The Investigatory Powers Tribunal. Archived from the original on 6 February\r\n2015. Retrieved 6 February 2015.\r\n102. ^ \"Intelligence Commissioners\". Archived from the original on 7 January 2014. Retrieved 14 December\r\n2013.\r\n103. ^ \"IPT Ruling on Interception\". GCHQ. Archived from the original on 6 February 2015. Retrieved 6\r\nFebruary 2015.\r\n104. ^ \"GCHQ censured over sharing of internet surveillance data with US\". BBC. 6 February 2015. Archived\r\nfrom the original on 7 February 2015. Retrieved 6 February 2015.\r\n105. ^ \"UK-US surveillance regime was unlawful 'for seven years'\". The Guardian. 6 February 2015. Archived\r\nfrom the original on 6 February 2015. Retrieved 6 February 2015.\r\n106. ^ \"IPT rejects assertions of mass surveillance\". GCHQ. 5 December 2014. Archived from the original on 6\r\nFebruary 2015. Retrieved 7 February 2015.\r\n107. ^ \"List of judgments\". Investigatory Powers Tribunal. 5 December 2014. Archived from the original on 6\r\nFebruary 2015. Retrieved 7 February 2015. “1. A declaration that the regime governing the soliciting,\r\nreceiving, storing and transmitting by UK authorities of private communications of individuals located in\r\nthe UK which have been obtained by US authorities pursuant to Prism and/or Upstream does not\r\ncontravene Articles 8 or 10 ECHR. 2. A declaration that the regime in respect of interception under ss8(4),\r\n15 and 16 of the Regulation of investigatory Powers Act 2000 does not contravene Articles 8 or 10 ECHR\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 19 of 21\n\nand does not give rise to unlawful discrimination contrary to Article 14, read together with Articles 8\r\nand/or 10 of the ECHR.”\r\n108. ^ \"Statement by the Interception of Communications Commissioner's Office (IOCCO) on the publication of\r\nthe Interception of Communications Commissioner's Report 2014\" (PDF). 12 March 2015. Archived from\r\nthe original (PDF) on 2 April 2015. Retrieved 14 March 2015.\"Report of the Interception of\r\nCommunications Commissioner\" (PDF). March 2015. Archived from the original (PDF) on 21 March\r\n2015. Retrieved 14 March 2015.\r\n109. ^ \"Privacy and Security: A modern and transparent legal framework\". Intelligence and Security Committee\r\nof Parliament. 12 March 2015. Archived from the original on 16 March 2015. Retrieved 14 March\r\n2015.\"UK surveillance 'lacks transparency', ISC report says\". BBC. 12 March 2015. Archived from the\r\noriginal on 8 March 2021. Retrieved 14 March 2015.\"Intelligence and security committee report: the key\r\nfindings\". The Guardian. 12 March 2015. Archived from the original on 8 March 2021. Retrieved 14 March\r\n2015.\r\n110. ^ \"Handful of UK spies accessed private information inappropriately, ISC says\". The Guardian. 12 March\r\n2015. Archived from the original on 1 January 2017. Retrieved 31 December 2016.\r\n111. ^ \"UK: Unlawful spying on two organisations reinforces need for intelligence services to end mass\r\nsurveillance\". Amnesty International UK. 22 June 2015. Archived from the original on 20 January 2017.\r\nRetrieved 31 December 2016.\r\n112. ^ \"Case No. IPT/13/132-9/H IN THE INVESTIGATORY POWERS TRIBUNAL\" (PDF). The Investigatory\r\nPowers Tribunal. 26 February 2015. Archived (PDF) from the original on 26 April 2015. Retrieved 31\r\nDecember 2016.\r\n113. ^ \"Legal privilege and the conflicting interests of GCHQ and the IPT\". The Guardian. 16 March 2015.\r\nArchived from the original on 1 January 2017. Retrieved 31 December 2016.\r\n114. ^ \"EU Human Rights Court Finds UK's Intelligence Agency GCHQ Guilty of Violating Privacy Laws | 25\r\nMay 2021\". The Daily NewsBrief. 25 May 2021. Archived from the original on 25 May 2021. Retrieved 25\r\nMay 2021.\r\n115. ^ \"British intelligence service spying on MPs in defiance of laws prohibiting it\". The Independent. 23 July\r\n2015. Archived from the original on 1 January 2017. Retrieved 31 December 2016.\r\n116. ^ \"Daily Hansard – Debate, 15 July 2014 : Column 697\". Parliament of the United Kingdom. 15 July\r\n2014. Archived from the original on 25 October 2016. Retrieved 31 December 2016.\r\n117. ^ Thomas Tamblyn (14 October 2015). \"GCHQ Can Monitor Communications Of MPs And Peers Rules\r\nTribunal\". Huffington Post. Archived from the original on 25 January 2018. Retrieved 24 January 2018.\r\n118. ^ \"Approved Judgment\" (PDF). Investigatory Powers Tribunal. Archived (PDF) from the original on 17\r\nMarch 2016. Retrieved 24 January 2018.\r\n119. ^ Council of Civil Service Unions v Minister for the Civil Service [1984] UKHL 9, [1985] ICR 14, [1985]\r\nIRLR 28, [1984] 3 WLR 1174, [1984] 3 All ER 935, [1985] AC 374 (22 November 1984), House of Lords\r\n(UK)\r\n120. ^ \"Life at GCHQ | GCHQ\". www.gchq-careers.co.uk. Archived from the original on 17 December 2019.\r\nRetrieved 5 April 2019.\r\n121. ^ \"How Cheltenham entered America's backyard\". New Scientist. 5 April 1984. Retrieved 12 December\r\n2014.\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 20 of 21\n\n122. ^ Thorpe, Vanessa (15 November 2014). \"Benedict Cumberbatch to inspire the next generation of\r\ncodebreakers\". The Observer. Archived from the original on 3 December 2014. Retrieved 6 December\r\n2014.\r\n123. ^ \"Puzzling entrance to world of spies\". BBC News. 13 January 2000.\r\n124. ^ Caroline Byrne (15 January 2000). \"The Spy Who Solved Me\". ABC News. Archived from the original on\r\n22 May 2001. Retrieved 12 March 2021.\r\n125. ^ \"Huge response to spy base puzzle\". BBC News. 10 July 2004.\r\n126. ^ Gordon Rayner (4 February 2016). \"GCHQ quiz solution: the full answers – but can you understand\r\nthem?\". The Daily Telegraph. Archived from the original on 12 January 2022.\r\n127. ^ Ewen MacAskill (3 August 2018). \"I spy ... another fiendishly difficult GCHQ puzzle book\". The\r\nGuardian. Archived from the original on 21 January 2019. Retrieved 20 January 2019.\r\n128. ^ Bacon, Thomas (2 January 2019). \"The U.K. Government's GCHQ has issued an official response to the\r\nDalek attack in the Doctor Who New Year Special – no need to panic!\". Screen Rant. Archived from the\r\noriginal on 15 February 2020. Retrieved 15 February 2020.\r\n129. ^ Bui, Hoai-Tran (2 January 2019). \"'Resolution' Proves All the New 'Doctor Who' Needed Was an Old\r\nVillain\". /Film. Archived from the original on 15 February 2020. Retrieved 15 February 2020.\r\n130. ^ \"GCHQ sitcom Intelligence starring David Schwimmer airs on Sky One\". So Glos. 3 September 2020.\r\nArchived from the original on 28 September 2020. Retrieved 3 September 2020.\r\n131. ^ \"GCHQ's history told for the first time in Behind the Enigma\". www.gchq.gov.uk. Archived from the\r\noriginal on 25 March 2023. Retrieved 8 March 2023.\r\n132. ^ Morris, Lauren (15 June 2022). \"The Undeclared War first look teases tense Simon Pegg and Mark\r\nRylance series\". RadioTimes.com. Archived from the original on 15 June 2022. Retrieved 16 June 2022.\r\nAldrich, Richard J. (2010). GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency.\r\nHarperCollins. ISBN 978-0007278473.\r\nFerris, John (2020). Behind the Enigma: The Authorised History of GCHQ. Bloomsbury. ISBN 978-1-\r\n5266-0546-7.\r\nJohnson, John (1997). The Evolution of British Sigint: 1653–1939. HMSO. ASIN B002ALSXTC.\r\nKahn, David (1991). Seizing the Enigma: The Race to Break the German U-Boats Codes, 1939–1943.\r\nHoughton Mifflin. ISBN 978-0395427392.\r\nSmith, Michael (2001). \"GC\u0026CS and the First Cold War\". In Smith, Michael; Erskine, Ralph (eds.). Action\r\nThis Day: Bletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer.\r\nBantam Press. ISBN 978-0593049105.\r\nOfficial website\r\nBBC: A final look at GCHQ's top secret Oakley site in Cheltenham\r\nThe Secret History of GCHQ BBC documentary\r\nSource: https://en.wikipedia.org/wiki/GCHQ\r\nhttps://en.wikipedia.org/wiki/GCHQ\r\nPage 21 of 21\n\nmonitoring stations 1960s, the increased were largely cost of run by inexpensive civilian employees National caused budgetary Service recruits, but problems. In 1965 when this ended a Foreign Office in the early review\nfound that 11,500 staff were involved in SIGINT collection (8,000 GCHQ staff and 3,500 military personnel),\n   Page 4 of 21   \n\nA no-strike with the Government agreement was eventually Communications negotiated Group of and the ban lifted the Public and Commercial by the incoming Labour Services government Union (PCS) in 1997, being formed\nto represent interested employees at all grades.[40][9] In 2000, a group of 14 former GCHQ employees, who had\nbeen dismissed after refusing to give up their union membership, were offered re-employment, which three of\nthem accepted.[41]      \n   Page 5 of 21   \n\nand/or 10 108. ^ \"Statement of the ECHR.” by the Interception of Communications Commissioner's Office (IOCCO) on the publication of\nthe Interception of Communications Commissioner's Report 2014\" (PDF). 12 March 2015. Archived from\nthe original (PDF) on 2 April 2015. Retrieved 14 March 2015.\"Report of the Interception of \nCommunications Commissioner\" (PDF). March 2015. Archived from the original (PDF) on 21 March\n2015. Retrieved 14 March 2015.     \n109. ^ \"Privacy and Security: A modern and transparent legal framework\". Intelligence and Security Committee\nof Parliament. 12 March 2015. Archived from the original on 16 March 2015. Retrieved 14 March \n2015.\"UK surveillance 'lacks transparency', ISC report says\". BBC. 12 March 2015. Archived from the\noriginal on 8 March 2021. Retrieved 14 March 2015.\"Intelligence and security committee report: the key\nfindings\". The Guardian. 12 March 2015. Archived from the original on 8 March 2021. Retrieved 14 March\n2015.      \n110. ^ \"Handful of UK spies accessed private information inappropriately, ISC says\". The Guardian. 12 March\n2015. Archived from the original on 1 January 2017. Retrieved 31 December 2016.  \n111. ^ \"UK: Unlawful spying on two organisations reinforces need for intelligence services to end mass \nsurveillance\". Amnesty International UK. 22 June 2015. Archived from the original on 20 January 2017.\nRetrieved 31 December 2016.     \n112. ^ \"Case No. IPT/13/132-9/H IN THE INVESTIGATORY POWERS TRIBUNAL\" (PDF). The Investigatory \nPowers Tribunal. 26 February 2015. Archived (PDF) from the original on 26 April 2015. Retrieved 31\nDecember 2016.     \n113. ^ \"Legal privilege and the conflicting interests of GCHQ and the IPT\". The Guardian. 16 March 2015.\nArchived from the original on 1 January 2017. Retrieved 31 December 2016.  \n114. ^ \"EU Human Rights Court Finds UK's Intelligence Agency GCHQ Guilty of Violating Privacy Laws | 25\nMay 2021\". The Daily NewsBrief. 25 May 2021. Archived from the original on 25 May 2021. Retrieved 25\nMay 2021.      \n115. ^ \"British intelligence service spying on MPs in defiance of laws prohibiting it\". The Independent. 23 July\n2015. Archived from the original on 1 January 2017. Retrieved 31 December 2016.  \n116. ^ \"Daily Hansard -Debate, 15 July 2014 : Column 697\". Parliament of the United Kingdom. 15 July\n2014. Archived from the original on 25 October 2016. Retrieved 31 December 2016.  \n117. ^ Thomas Tamblyn (14 October 2015). \"GCHQ Can Monitor Communications Of MPs And Peers Rules\nTribunal\". Huffington Post. Archived from the original on 25 January 2018. Retrieved 24 January 2018.\n118. ^ \"Approved Judgment\" (PDF). Investigatory Powers Tribunal. Archived (PDF) from the original on 17\nMarch 2016. Retrieved 24 January 2018.    \n119. ^ Council of Civil Service Unions v Minister for the Civil Service [1984] UKHL 9, [1985] ICR 14, [1985]\nIRLR 28, [1984] 3 WLR 1174, [1984] 3 All ER 935, [1985] AC 374 (22 November 1984), House of Lords\n(UK)      \n120. ^ \"Life at GCHQ | GCHQ\". www.gchq-careers.co.uk. Archived from the original on 17 December 2019.\nRetrieved 5 April 2019.     \n121. ^ \"How Cheltenham entered America's backyard\". New Scientist. 5 April 1984. Retrieved 12 December \n2014.      \n   Page 20 of 21",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://en.wikipedia.org/wiki/GCHQ"
	],
	"report_names": [
		"GCHQ"
	],
	"threat_actors": [
		{
			"id": "5d2bd376-fcdc-4c6a-bc2c-17ebbb5b81a4",
			"created_at": "2022-10-25T16:07:23.667223Z",
			"updated_at": "2026-04-10T02:00:04.705778Z",
			"deleted_at": null,
			"main_name": "GCHQ",
			"aliases": [
				"Government Communications Headquarters",
				"Operation Socialist"
			],
			"source_name": "ETDA:GCHQ",
			"tools": [
				"Prax",
				"Regin",
				"WarriorPride"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "20c759c2-cd02-45bb-85c6-41bde9e6a7cf",
			"created_at": "2024-01-18T02:02:34.189827Z",
			"updated_at": "2026-04-10T02:00:04.721082Z",
			"deleted_at": null,
			"main_name": "HomeLand Justice",
			"aliases": [
				"Banished Kitten",
				"Karma",
				"Red Sandstorm",
				"Storm-0842",
				"Void Manticore"
			],
			"source_name": "ETDA:HomeLand Justice",
			"tools": [
				"BABYWIPER",
				"BiBi Wiper",
				"BiBi-Linux Wiper",
				"BiBi-Windows Wiper",
				"Cl Wiper",
				"LowEraser",
				"No-Justice Wiper",
				"Plink",
				"PuTTY Link",
				"RevSocks",
				"W2K Res Kit"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434090,
	"ts_updated_at": 1775826739,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/9c20811fe0cd22f8955d7517da9811533fa85fa4.pdf",
		"text": "https://archive.orkl.eu/9c20811fe0cd22f8955d7517da9811533fa85fa4.txt",
		"img": "https://archive.orkl.eu/9c20811fe0cd22f8955d7517da9811533fa85fa4.jpg"
	}
}