Intelligence

British firm now owned by Vodafone aided GCHQ in wiretapping undersea cables

New documents leaked by Snowden reveal the crucial role of a Vodafone-owned company in wiretapping of undersea cables for massive surveillance.

According to several secret documents leaked by Edward Snowden US and British Intelligence wiretap undersea cables used by telecommunication companies as part of their mass surveillance programs.

In June, Snowden released documents that were published by The Register and that reveal the existence of a secret British spy base located at Seeb on the northern coast of Oman, a strategic position that allows the GCHQ to tap several undersea cables passing through the Strait of Hormuz into the Persian/Arabian Gulf.

Other document details the operations conducted in other major spy base located in Bude in Cornwall, in this plant the British intelligence access network feeds Internet data from more than 18 undersea cables coming into different parts of Britain either direct to GCHQ in Cheltenham.

“The majority of large cables come ashore in Cornwall, and have been connected directly to Bude. These include major connections such as FLAG (Fibre optic Link Around the Globe), two of whose cables have been intercepted. Because the FLAG interceptions had to be kept secret from the cables’ owners, one report states, the tapping connections were installed in an undisclosed UK location and “backhauled” to Bude, in the technical language of the communications industry.” States the Register.

Now, according to new reports based on documents leaked by the whistleblower Edward Snowden, the undersea cables have become an integral part of the global mass surveillance system operated by the GCHQ thanks the support provided by a company Cable & Wireless, which was acquired by Vodafone in July 2012 for about $1.5 billion.

The details about the support provided to the massive urveillance were revealed by the British Channel 4 News, the German newspaper Süddeutsche Zeitung,and the German broadcaster WDR, who collaborated with the Intercept. The founding editor Laura Poitras, in fact, obtained a preview of the documents in advance of their publication.

Data provided in the reports are amazing, British telecommunications firms supported GCHQ in collectiong large volume of internet data from undersea cables, the overall amount of information from 2007 to 2012 registered a 7,000-fold increase, meanwhile the spying system monitored nearly 46 billion private communications “events” every day.

The data collected by the undersea cable would include content from online messages, browsing sessions, VOIP calls and emails.

British telecommunications company Cable & Wireless played a crucial role in tapping of the undersea cables, in February 2009 a GCHQ employee was assigned to work within company in a “full-time project management” role to follow the operation from the inside.

The GCHQ paid Cable & Wireless more than £5 million ($9 million) as part of an annual lease for GCHQ to access the undersea cables. In the documents the company is referred as a “partner” codenamed Gerontic.

The documents reveal that the support is also extended into spying operation on a rival foreign communications company:

“According to the reports, Cable & Wireless also appears to have helped GCHQ obtain data from a rival foreign communications company, India’sReliance Communications, enabling the spies to sweep up communications sent by millions of internet users worldwide through a Reliance-owned cable that stretches from England across Asia and the Middle East. This so-called “access point” for GCHQ was named Nigella and located near an agency surveillance base in Bude, Cornwall. Reliance did not respond to a request for comment.” states The Intercept in a blog post.

Despite the Cable & Wireless bought by Vodafone in July 2012 the Nigella surveillance access point remained active as of April 2013.

Vodafone declared that it complies with the law without giving “direct access” to its undersea cables, it has provided data based on warrants issued by the government.

“There are processes for us to do that [comply with warrants] which we’re not allowed to talk about because the law constrains us from revealing these things,” said Vodafone spokesman Matt Peacock in a statement to Channel 4 News. “We don’t go beyond what the law requires.”

GCHQ obviously hasn’t commented the news.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  undersea cable tapping, GCHQ)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

16 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

17 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

22 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.