Understanding the GCHQ hacking toolkit

Earlier this month, the campaigning US lawyer Glenn Greenwald released a seemingly genuine document that gave an intriguing insight in to the inner workings of GCHQ (Government Communications Headquarters), one of Britain’s three secret intelligence and security agencies.

Greenwald has been acting as an intermediary for Edward Snowden, the US computer professional who formally worked for the NSA. Snowden broke ranks in 2013 and released into the public domain a large cache of security information relating to both the US and UK.

The GCHQ-related document, released with an accompanying article by Greenwald, appears to be a detailed description of a toolkit for security operatives enabling them to intervene without detection in the digital lives and web related activities of their “targets”. Described as a “manipulation toolkit” by Wired Magazine, the devices seem to have been developed by GCHQ’s Joint Threat Research Intelligence Group (JTRIG).

The toolkit, as reported, certainly would give any digital intelligence personnel a versatile armoury with which to pursue their operations. Here are some prime examples, with the titles used for each technique or activity allegedly the ones designated by JTRIG:

Silverlord

This weapon targets websites displaying extremist video, through rigorous content removal.

Birdstrike

Offers monitoring of Twitter and automated data collection from profiles.

Fatyak

Performs similarly to Birdstrike, but this time automates public data retrieval from LinkedIn

Godfather

Automatically gathers public data from Facebook.

Spring Bishop

Tracks down private photos of reconnaissance targets on Facebook

Miniature Hero

This module provides agents with the ability to eavesdrop on Skype conversations. According to Wired Magazine, this tool:

“Immediately flags up concerns about the level of Microsoft’s involvement. It was in 2013, shortly after Snowden’s leaks first hit the papers, that it was revealed Microsoft had handed encrypted messages over to the NSA, so that it could infiltrate email, cloud storage and web chats.”

Burlesque

The ability to send bogus text messages, which presumably look convincing and genuine to the receiver.

Meanwhile, there’s a range of apps that can manipulate websites. These include a facility to ‘rig’ or disrupt online voting, as well as a feature to boost the number of page views a particular site receives. At the same time, messages on YouTube can be increased in prominence or amplified, apparently subverting the platform’s own techniques for distinguishing between and promoting different types of content.

All in all, the documentation released by Greenwald gives an impression of GCHQ having a wide range of subversive, disruptive, propagandising, and surveillance techniques at its disposal.

GCHQ responded to Greenwald by stating that the agency acts “in accordance with a strict legal and policy framework”, while the process is subjected to “rigorous oversight”.

Greenwald calls this a standard “boilerplate” response. However, one should, of-course, note that organisations committed to secrecy in the public interest are perhaps not always able to defend themselves as openly as they might like. To some extent, their hands are tied.

In conclusion, campaigners such as Greenwald do raise the stimulating possibility that it’s not only the cyber-criminals who are at work manipulating the digital world. Sometimes those defending us in the public interest can, apparently, be just as cunning.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy