• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 

SharePoint zero-day CVE-2025-53770 actively exploited in the wild

 | 

Singapore warns China-linked group UNC3886 targets its critical infrastructure

 | 

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 54

 | 

Security Affairs newsletter Round 533 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Radiology Associates of Richmond data breach impacts 1.4 million people

 | 

Fortinet FortiWeb flaw CVE-2025-25257 exploited hours after PoC release

 | 

Authorities released free decryptor for Phobos and 8base ransomware

 | 

Anne Arundel Dermatology data breach impacts 1.9 million people

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Pierluigi Paganini June 23, 2013

Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications.

Operation Tempora, this is the name of last massive tapping program conducted by Britain’s Government Communications Headquarters (GCHQ) and revealed by The Guardian.

Operation Tempora has been going on for at least 18 months, British intelligence adopted “intercept probes” to intercept huge volume of data from transatlantic fiber-optic cables

“The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.”

Once again the news has revealed an uncomfortable truth, spying activities and communication monitoring are a common practice for any government that ignore the user’s privacy in the name of security.

British intelligence gathered in this mode an enormous quantity of data including email messages, Facebook posts, internet histories and calls, but reality is more disturbing if confirmed by the revelation of Edward Snowden that sustains that British authorities share this information with the NSA.

“For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fiber-optic cables that ring the world,” the Guardian noted.

For the analysis of a so great amount of traffic and data mining of its informative content the GCHQ has a complex set of filters, for example there are able to exclude low-value traffic such as peer-to-peer downloads a measure that allows the analyst to reduce the overall traffic volumes by up to 30%.

Operation Tempora

The Guardian revealed that GCHQ has established a surveillance machine that is efficient at least such as the US one, the NSA uses a total of 31,000 specific search terms to use for monitoring purpose, including specific phone numbers, email addresses and other identifiers to keep an eye on communications being carried out by persons or entities of interest, the GCHQ agency uses about 40,000 of similar terms for filtering.

“UK officials could also claim GCHQ “produces larger amounts of metadata than NSA”. (Metadata describes basic information on who has been contacting whom, without detailing the content.)”  The guardian states.

According Edward Snowden thanks to Operation Tempora the British secret services intercepts petabytes worth of communication data from fiber-optic cables every day, they include commercial data obtained with collaboration of private companies.

The Guardian reports that British Government signed a secret agreements with commercial companies, described in one document as “intercept partners”, it paid the corporations for the cost of their cooperation.

“They were assigned “sensitive relationship teams” and staff were urged in one internal guidance paper to disguise the origin of “special source” material in their reports for fear that the role of the companies as intercept partners would cause “high-level political fallout”. Stated the Guardian of the intercept partners.

GCHQ doesn’t reveal the names of the companies involved in the Operation Tempora, but it must be pointed that companies were obliged by law to cooperate with the GCHQ.

The Guardian revealed that on May 2012 300 analysts from the GCHQ and 250 from the NSA worked to analyze the collected data searching for information on possible terrorist threats and track of other criminal activity.

Prism isn’t the unique surveillance program, principal movement in defense of human rights and freedom of expression are concerned about the nature and scope of the surveillance programs, another element of concern is represented by the possibility that group of state-sponsored hackers could access to these enormous amount of information with serious consequences.

The Guardian reported that GHCQ is investing to expand its data interception capabilities, during the past five years they spent a great effort that led it to handle 600 million telephone “events” a day and to process data from at least 46 of the more than 200, 10Gbps fiber-optic cables on which it placed intercepts. These figures were related to the activities conducted last year and give an idea of the efficiency of programs such as the Operation Tempora.

UK Government, exactly as any other government sustains that thanks to the intense activity of tapping it gathered information of interest that has apparently allowed the agency to identify terrorist threats and other cyber threats.

Pierluigi Paganini

(Security Affairs – Operation Tempora, Surveillance)


facebook linkedin twitter

GCHQ Operation Tempora PRISM privacy surveillance The Guardian

you might also like

Pierluigi Paganini July 23, 2025
U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog
Read more
Pierluigi Paganini July 23, 2025
Sophos fixed two critical Sophos Firewall vulnerabilities
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

    Hacking / July 23, 2025

    Sophos fixed two critical Sophos Firewall vulnerabilities

    Security / July 23, 2025

    French Authorities confirm XSS.is admin arrested in Ukraine

    Cyber Crime / July 23, 2025

    Microsoft linked attacks on SharePoint flaws to China-nexus actors

    APT / July 23, 2025

    Cisco confirms active exploitation of ISE and ISE-PIC flaws

    Hacking / July 22, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT