May 5, 2024

Blighty’s GCHQ stashes away 50+ billion records a day on people. Just let that sink in | Alexander J Martin

aerial photograph of GCHQ main building

The enormous scale of GCHQ’s surveillance was revealed recently by newly published Snowden documents. The files note the growth in capabilities enjoyed by the UK government’s snoopers since intercepting communications in bulk from 2007.

These details were revealed in a series of documents published by The Intercept including one on the “flat data store” codenamed BLACK HOLE, and a document calling itself “the one-stop shop for Cyber Defence Operations legal and policy information.”

When the slide on BLACK HOLE was composed in March 2009, the flat data store held more than 1.1 trillion things which GCHQ had collected since August 2007.

The store weighed in at 217TB when uncompressed, the largest share of which was HTTP data (41 per cent), which alongside web search (19 per cent) and SMTP data (12 per cent) accounted for almost three quarters of all that it held.

gchq_road_sign

Additional data covered instant messenger records, hacking logs for Computer Network Exploitation (CNE) operations, and the use of “Anonymisers.”

The collection began after Section 32 of the Terrorism Act 2007 had amended RIPA to extend interception warrants.

By 2010, GCHQ stated it was logging “30bn metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion.”

GCHQ has since “developed new population scale analytics for multi-petabyte cluster,” which allows “population scale target discovery.”

In a vision document for 2013, its aim was to have created “the world’s biggest SIGINT engine to run cyber operations and to enable IA, Effects and SIGINT … [as well as] to perform CNE exfiltration, eAD, beaconry, and geo-location.”

BLACK HOLE’s recorded events contain only metadata, according to the “Events” page from the GCWiki, although it notes that “sometimes there are grey areas between events and content” citing how the subject of an email is generally transmitted in the header portion of the SMTP communication, despite being considered content.

Slides showing GCHQ’s Content-Metadata Matrix suggest that the spooks’ views of what is metadata extends to passwords, buddylists, and folders used to organize emails.

The majority of GCHQ’s operational data is acquired through the agency’s operational activities, whether they are interception, computer network exploitation (CNE, or aggressive hacking), or through JTRIG operations.

One new document also discloses a number of tools used to analyze the data stored in BLACK HOLE, which are complementary and provide an insight into the depth and breadth of GCHQ’s surveillance practices. These tools all come under a portion of GCHQ’s analysis project called BLAZING SADDLES.

It is worth noting that the word “target” here does not mean a person specified for investigation by a warrant, but merely a hypothetical identity which has had identifiers allocated to it.

  • AUTOASSOC provides information as to which Target Detection Identities (TDIs) have been seen at the same time and from the same IP addresses as other TDIs – allowing the spooks to enlarge the number of identifiers tied to a particular target.

 

  • HRMap provides information about host-referrer relationships, examining how internauts traverse the web, i.e., what route they have taken to a particular site, and where they proceed to.

 

  • INFINITE MONKEYS is a tool which targets v-bulletin software, to reveal the forum accounts of targets and additionally to target particular forum users.

 

  • KARMA POLICE, which we have reported on, allows the spooks to know which websites the target visited, and when/where those targets occur – all of which is additionally tied to IPs.

 

  • MARBLED GECKO provides information about the use of Google Earth and Google Maps, which combined with MUTANT BROTH allows the noseys to see who is looking at particular areas of the Earth.

 

  • MEMORY HOLE provides information on web searches made on engines such as Google’s. It provides information on when, where, and from which IP addresses particular searches were made.

 

  • MUTANT BROTH is a tool to sift through BLACK HOLE data by TDIs, such as cookies. It allows the spooks to create a profile of any given target’s online activities.

 

  • SAMUEL PEPYS is described as “a near real-time Internet diarisation tool. It enables powerful IP stream analysis/profiling by fusing all available traffic types in one place. It contains both unselected events and content.”

 

  • SOCIAL ANIMAL provides information about how targets interact with other targets, and with files/pictures/video on the internet.

 

  • SOCIAL ANTHROPOID is a “converged comms events database” which enables the spooks to see who their targets have communicated with “via phone, internet, or using converged channels (e.g., sending emails from a phone or making voice calls over the internet).” This project is set to subsume SOCIAL ANIMAL.

 

  • GOLDEN AXE, which shares its name with a classic side-scrolling Sega game, is primarily for International Mobile Equipment Identity defeats – allowing the spooks to figure out whether particular mobile devices uniquely identify targets. The Register understands that some handsets may have identical IMEI, as in India.

 

These tools were being used in a Joint Collaboration Environment titled Innov8, which was testing large-scale analytics using both GCHQ and NSA data.

A sample search was provided, based on automatic TDIs, which showed visits to pornography site YouPorn, as well as Reuters, Facebook, Yahoo, and Google.

The Intercept noted that MUTANT BROTH’s ability to identify cookies was integral to GCHQ’s attack on Belgian telco Belgacom.

Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware.

The hack, codenamed “Operation Socialist,” gained access to Belgacom’s Core GRX routers so the spooks could run man-in-the middle attacks against targets roaming with smartphones.

British persons of interest whose data is slurped up by GCHQ are passed off to MI5, though presumably uninteresting Britons’ data is simply bundled into BLACK HOLE for later analysis.

While both GCHQ and MI5 are intelligence agencies, they report to different government ministers. GCHQ is answerable to the Foreign Secretary – who at the time of the slides’ composition was David Miliband, although is now Philip Hammond – while the Security Service, as MI5 is formally known, reports directly to the Home Secretary – once Jacqui Smith, and now Theresa May.

MI5, which has jurisdiction over domestic surveillance activities, also operates its own slurpage as part of a program called DIGINT or Digital Intelligence (compare to SIGINT or Signals Intelligence).

As noted by journalist Ryan Gallagher, the Intelligence and Security Committee’s (ISC) 2012 report [PDF, pg. 60] featured claims by the former director general of MI5, Jonathan Evans, regarding the DIGINT program.

203. The Security Service is undertaking a number of major projects covering estates, business continuity, core IT systems, and improving its digital investigative capabilities. A notable success during the reporting period was the completion of the Digital Intelligence (DIGINT) program, which aimed to improve systems for the collection and analysis of intelligence material gathered electronically. The Director General explained:

“One of the things that really drove us on the investment of DIGINT was a discussion where the relevant directors explained that actually, of all the material that we’ve caught, over half was not being processed. Now, as an intelligence organisation, that’s a nightmare. I mean, quite frankly, I would rather not have the intelligence at all and miss something than have the intelligence and not actually having processed it … We have made real progress on that, and I’m very proud of DIGINT.”

The report also pointed out that MI5’s DIGINT project “was completed in April 2011 and has dramatically improved the efficiency and management of the Service’s digital intelligence, resulting in the capability to process significantly greater volumes of digital intelligence material.”

However, the program has come under question. In another ISC report [PDF] into the murder of Fusilier Lee Rigby, it was noted that MI5’s DIGINT team had performed sub-optimally after it had been tasked with an umbrella operation, prior to the murder, which included among its targets Michael Adebowale – one of Rigby’s killers.

The report codenamed this umbrella investigation “Operation FIR”:

Whilst the majority of MI5’s operations investigate particular individuals or networks, umbrella operations are instead designed to capture, process, and investigate leads based around a particular theme … MI5 has advised that approximately 10 per cent of their investigations are “umbrella operations” such as Operation FIR.

MI5’s DIGINT team had been passed information by GCHQ on Adebowale, and was subsequently tasked by Operation FIR’s investigative team with identifying the individual concerned – who at that point was presumably known only by his TIDs.

The ISC report found that MI5’s DIGINT team had the ability to identify Adobowale by September 2011, but hadn’t done so until November, suggesting a significant competence gap between GCHQ’s surveillance abilities and those of MI5, despite the latter’s access to GCHQ’s material.

Despite the review’s findings of troubles shared between agencies, it found that “given what Agencies knew at the time, they were not in a position to prevent the murder of Fusilier Rigby.”

The answer, of course, is to know more. However, the committee stated it had specific concerns regarding the MI5 DIGINT team’s expertise in handling enquiries, and recorded Evans as stating that MI5 often needed expert assistance from the techies at GCHQ:

GCHQ is the … centre of excellence on this. [So] we rely on GCHQ to provide the capabilities. We apply some of them, some of the tools … We draw on their help a bit … Sometimes it is – it can be a very elaborate thing to pursue, because of the sheer diversity of [online activity].

Theresa May, as Home Secretary, informed the Committee that she felt “the role of GCHQ was evolving, and the balance between GCHQ and MI5 resource and expertise in areas such as digital intelligence may change in future as a result:”

[In terms of] the role of GCHQ and the relative role of GCHQ domestically and internationally … this is something that … has been changing, but I think actually there will be a point at which there is a genuine question to be asked about where that role should sit and what the balance between those two should be, and in a sense, depending on that answer, depends on the extent to which it would be necessary to retain the capability within the Security Service.

source