• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Ahold Delhaize data breach affected over 2.2 Million individuals

 | 

Facebook wants access to your camera roll for AI photo edits

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51

 | 

Security Affairs newsletter Round 530 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

The FBI warns that Scattered Spider is now targeting the airline sector

 | 

LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage

 | 

Taking over millions of developers exploiting an Open VSX Registry flaw

 | 

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Pierluigi Paganini June 23, 2013

Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications.

Operation Tempora, this is the name of last massive tapping program conducted by Britain’s Government Communications Headquarters (GCHQ) and revealed by The Guardian.

Operation Tempora has been going on for at least 18 months, British intelligence adopted “intercept probes” to intercept huge volume of data from transatlantic fiber-optic cables

“The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.”

Once again the news has revealed an uncomfortable truth, spying activities and communication monitoring are a common practice for any government that ignore the user’s privacy in the name of security.

British intelligence gathered in this mode an enormous quantity of data including email messages, Facebook posts, internet histories and calls, but reality is more disturbing if confirmed by the revelation of Edward Snowden that sustains that British authorities share this information with the NSA.

“For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fiber-optic cables that ring the world,” the Guardian noted.

For the analysis of a so great amount of traffic and data mining of its informative content the GCHQ has a complex set of filters, for example there are able to exclude low-value traffic such as peer-to-peer downloads a measure that allows the analyst to reduce the overall traffic volumes by up to 30%.

Operation Tempora

The Guardian revealed that GCHQ has established a surveillance machine that is efficient at least such as the US one, the NSA uses a total of 31,000 specific search terms to use for monitoring purpose, including specific phone numbers, email addresses and other identifiers to keep an eye on communications being carried out by persons or entities of interest, the GCHQ agency uses about 40,000 of similar terms for filtering.

“UK officials could also claim GCHQ “produces larger amounts of metadata than NSA”. (Metadata describes basic information on who has been contacting whom, without detailing the content.)”  The guardian states.

According Edward Snowden thanks to Operation Tempora the British secret services intercepts petabytes worth of communication data from fiber-optic cables every day, they include commercial data obtained with collaboration of private companies.

The Guardian reports that British Government signed a secret agreements with commercial companies, described in one document as “intercept partners”, it paid the corporations for the cost of their cooperation.

“They were assigned “sensitive relationship teams” and staff were urged in one internal guidance paper to disguise the origin of “special source” material in their reports for fear that the role of the companies as intercept partners would cause “high-level political fallout”. Stated the Guardian of the intercept partners.

GCHQ doesn’t reveal the names of the companies involved in the Operation Tempora, but it must be pointed that companies were obliged by law to cooperate with the GCHQ.

The Guardian revealed that on May 2012 300 analysts from the GCHQ and 250 from the NSA worked to analyze the collected data searching for information on possible terrorist threats and track of other criminal activity.

Prism isn’t the unique surveillance program, principal movement in defense of human rights and freedom of expression are concerned about the nature and scope of the surveillance programs, another element of concern is represented by the possibility that group of state-sponsored hackers could access to these enormous amount of information with serious consequences.

The Guardian reported that GHCQ is investing to expand its data interception capabilities, during the past five years they spent a great effort that led it to handle 600 million telephone “events” a day and to process data from at least 46 of the more than 200, 10Gbps fiber-optic cables on which it placed intercepts. These figures were related to the activities conducted last year and give an idea of the efficiency of programs such as the Operation Tempora.

UK Government, exactly as any other government sustains that thanks to the intense activity of tapping it gathered information of interest that has apparently allowed the agency to identify terrorist threats and other cyber threats.

Pierluigi Paganini

(Security Affairs – Operation Tempora, Surveillance)


facebook linkedin twitter

GCHQ Operation Tempora PRISM privacy surveillance The Guardian

you might also like

Pierluigi Paganini June 28, 2025
LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage
Read more
Pierluigi Paganini June 27, 2025
Taking over millions of developers exploiting an Open VSX Registry flaw
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Ahold Delhaize data breach affected over 2.2 Million individuals

    Data Breach / June 30, 2025

    Facebook wants access to your camera roll for AI photo edits

    Social Networks / June 29, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51

    Breaking News / June 29, 2025

    Security Affairs newsletter Round 530 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / June 29, 2025

    The FBI warns that Scattered Spider is now targeting the airline sector

    Cyber Crime / June 28, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT