GCHQ – What Lies Beneath Australia and all -wiki

The Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom.[3] Based in “The Doughnut” in the suburbs of Cheltenham, GCHQ is the responsibility of the country’s Secretary of State for Foreign and Commonwealth Affairs, but it is not a part of the Foreign Office and its director ranks as a Permanent Secretary.

GCHQ was originally established after the First World War as the Government Code and Cypher School (GC&CS) and was known under that name until 1946. During the Second World War it was located at Bletchley Park, where it was responsible for breaking of the German Enigma codes. There are two main components of the GCHQ, the Composite Signals Organisation (CSO), which is responsible for gathering information, and the National Cyber Security Centre (NCSC), which is responsible for securing the UK’s own communications. The Joint Technical Language Service (JTLS) is a small department and cross-government resource responsible for mainly technical language support and translation and interpreting services across government departments. It is co-located with GCHQ for administrative purposes.


In 2013, GCHQ received considerable media attention when the former National Security Agency contractor Edward Snowden revealed that the agency was in the process of collecting all online and telephone data in the UK via the Tempora programme.[4] Snowden’s revelations began a spate of ongoing disclosures of global surveillanceThe Guardian newspaper was then forced to destroy all incriminating files given to them by Snowden because of the threats of lawsuits from the UK Government.[5]


GCHQ is led by the Director of GCHQ, Jeremy Fleming,[6] and a Corporate Board, made up of executive and non-executive directors. Reporting to the Corporate Board is:[7][8]

  • Sigint missions: comprising maths and cryptanalysis, IT and computer systems, linguistics and translation, and the intelligence analysis unit
  • Enterprise: comprising applied research and emerging technologies, corporate knowledge and information systems, commercial supplier relationships, and biometrics
  • Corporate management: enterprise resource planning, human resources, internal audit, and architecture
  • Communications-Electronics Security Group

According to Edward Snowden, GCHQ has two principal umbrella programs for collecting communications:

GCHQ also has had access to the US internet monitoring programme PRISM since at least June 2010.[56] PRISM is said to give the National Security Agency and FBI easy access to the systems of nine of the world’s top internet companies, including Google, Facebook, Microsoft, Apple, Yahoo, and Skype.[57]

In February 2014, The Guardian, based on documents provided by Snowden, revealed that GCHQ had indiscriminately collected 1.8 million private Yahoo webcam images from users across the world.[58] In the same month NBC and The Intercept, based on documents released by Snowden, revealed the Joint Threat Research Intelligence Group and the CNE units within GCHQ. Their mission was cyber operations based on “dirty tricks” to shut down enemy communications, discredit, and plant misinformation on enemies.[59] These operations were 5% of all GCHQ operations according to a conference slideshow presented by the GCHQ.[60]

Soon after becoming Director of GCHQ in 2014, Robert Hannigan wrote an article in the Financial Times on the topic of internet surveillance, stating that “however much [large US technology companies] may dislike it, they have become the command and control networks of choice for terrorists and criminals” and that GCHQ and its sister agencies “cannot tackle these challenges at scale without greater support from the private sector”, arguing that most internet users “would be comfortable with a better and more sustainable relationship between the [intelligence] agencies and the tech companies”. Since the 2013 global surveillance disclosures, large US technology companies have improved security and become less co-operative with foreign intelligence agencies, including those of the UK, generally requiring a US court order before disclosing data.[61][62] However the head of the UK technology industry group techUK rejected these claims, stating that they understood the issues but that disclosure obligations “must be based upon a clear and transparent legal framework and effective oversight rather than, as suggested, a deal between the industry and government”.[63]

In 2015, documents obtained by The Intercept from US National Security Agency whistleblower Edward Snowden revealed that GCHQ had carried out a mass-surveillance operation, codenamed KARMA POLICE, since about 2008.[64] The KARMA POLICE operation swept up the IP address of Internet users visiting websites. The program was established with no public scrutiny or oversight. KARMA POLICE is a powerful spying tool in conjunction with other GCHQ programs, because IP addresses could be cross-referenced with other data.[64] The goal of the program, according to the documents, was “either (a) a web browsing profile for every visible user on the internet, or (b) a user profile for every visible website on the internet.”[64]

In 2015, GCHQ admitted for the first time in court that it conducts computer hacking.[65]

In 2017, US Press Secretary Sean Spicer alleged that GCHQ had conducted surveillance on US President Donald Trump, basing the allegation on statements made by a media commentator during a Fox News segment.[66][67] The US government formally apologised for the allegations and promised they would not be repeated.[68][69][70] However, surveillance of Russian agents did pick up contacts made by Trump’s campaign team in the run up to his election, which was passed on to US agencies.[71][72] On 31 October 2018, GCHQ joined Instagram.[73][74]

Security mission[edit]

As well as a mission to gather intelligence, GCHQ has for a long-time had a corresponding mission to assist in the protection of the British government’s own communications. When the Government Code and Cypher School (GC&CS) was created in 1919, its overt task was providing security advice.[75] GC&CS’s Security section was located in Mansfield College, Oxford during the Second World War.[75]

In April 1946, GC&CS became GCHQ, and the now GCHQ Security section moved from Oxford to join the rest of the organisation at Eastcote later that year.[75]


From 1952 to 1954, the intelligence mission of GCHQ relocated to Cheltenham; the Security section remained at Eastcote,[75] and in March 1954 became a separate, independent organisation: the London Communications Security Agency (LCSA),[75] which in 1958 was renamed to the London Communications-Electronic Security Agency (LCESA).[75]

In April 1965, GPO and MOD units merged with LCESA to become the Communications-Electronic Security Department (CESD).[75]


In October 1969, CESD was merged into GCHQ and becoming Communications-Electronic Security Group (CESG).[75]

In 1977 CESG relocated from Eastcote to Cheltenham.[75]

CESG continued as the UK National Technical Authority for information assurance, including cryptography. CESG did not manufacture security equipment, but worked with industry to ensure the availability of suitable products and services, while GCHQ itself funded research into such areas, for example to the Centre for Quantum Computing at Oxford University and the Heilbronn Institute at the University of Bristol.[76]

In the 21st century, CESG ran a number of assurance schemes such as CHECK, CLASCommercial Product Assurance (CPA) and CESG Assisted Products Service (CAPS).[77]

Public key encryption[edit]

In late 1969 the concept for public key encryption was developed and proven by James H. Ellis, who had worked for CESG (and before it, CESD) since 1965. Ellis lacked the necessary number theory expertise necessary to build a workable system. Subsequently, a feasible implementation scheme via an asymmetric key algorithm was invented by another staff member Clifford Cocks, a mathematics graduate. This fact was kept secret until 1997.[78]


In 2016, the National Cyber Security Centre was established under GCHQ, but located in London, as the UK’s authority on cyber security. It absorbed and replaced CESG as well as activities that had previously existed outside GCHQ: the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the Centre for the Protection of National Infrastructure (CPNI).[79]

Joint Technical Language Service[edit]

The Joint Technical Language Service (JTLS) was established in 1955,[80] drawing on members of the small Ministry of Defence technical language team and others, initially to provide standard English translations for organisational expressions in any foreign language, discover the correct English equivalents of technical terms in foreign languages and discover the correct expansions of abbreviations in any language.[81] The remit of the JTLS has expanded in the ensuing years to cover technical language support and interpreting and translation services across the UK Government and to local public sector services in Gloucestershire and surrounding counties. The JTLS also produces and publishes foreign language working aids under crown copyright and conducts research into machine translation and on-line dictionaries and glossaries. The JTLS is co-located with GCHQ for administrative purposes.[82]

International relationships[edit]

GCHQ operates in partnership with equivalent agencies worldwide in a number of bi-lateral and multi-lateral relationships. The principal of these is with the United States (National Security Agency), Canada (Communications Security Establishment), Australia (Australian Signals Directorate) and New Zealand (Government Communications Security Bureau), through the mechanism of the UK-US Security Agreement, a broad intelligence-sharing agreement encompassing a range of intelligence collection methods. Relationships are alleged to include shared collection methods, such as the system described in the popular media as ECHELON, as well as analysed product.[83]

Legal basis[edit]

GCHQ’s legal basis is enshrined in the Intelligence Services Act 1994 Section 3 as follows:

(1) There shall continue to be a Government Communications Headquarters under the authority of the Secretary of State; and, subject to subsection (2) below, its functions shall be—

(a) to monitor or interfere with electromagnetic, acoustic and other emissions and any equipment producing such emissions and to obtain and provide information derived from or related to such emissions or equipment and from encrypted material; and
(b) to provide advice and assistance about—

(i) languages, including terminology used for technical matters, and
(ii) cryptography and other matters relating to the protection of information and other material, to the armed forces of the Crown, to Her Majesty’s Government in the United Kingdom or to a Northern Ireland Department or to any other organisation which is determined for the purposes of this section in such manner as may be specified by the Prime Minister.

(2) The functions referred to in subsection (1)(a) above shall be exercisable only—

(a) in the interests of national security, with particular reference to the defence and foreign policies of Her Majesty’s Government in the United Kingdom; or
(b) in the interests of the economic well-being of the United Kingdom in relation to the actions or intentions of persons outside the British Islands; or
(c) in support of the prevention or detection of serious crime.

(3) In this Act the expression “GCHQ” refers to the Government Communications Headquarters and to any unit or part of a unit of the armed forces of the Crown which is for the time being required by the Secretary of State to assist the Government Communications Headquarters in carrying out its functions.[84]

Activities that involve interception of communications are permitted under the Regulation of Investigatory Powers Act 2000; this kind of interception can only be carried out after a warrant has been issued by a Secretary of State. The Human Rights Act 1998 requires the intelligence agencies, including GCHQ, to respect citizens’ rights as described in the European Convention on Human Rights.[85][86][87]


The Prime Minister nominates cross-party Members of Parliament to an Intelligence and Security Committee. The remit of the Committee includes oversight of intelligence and security activities and reports are made directly to Parliament.[88] Its functions were increased under the Justice and Security Act 2013 to provide for further access and investigatory powers.

Judicial oversight of GCHQ’s conduct is exercised by the Investigatory Powers Tribunal.[89] The UK also has an independent Intelligence Services Commissioner and Interception of Communications Commissioner, both of whom are former senior judges.[90]

The Investigatory Powers Tribunal ruled in December 2014 that GCHQ does not breach the European Convention of Human Rights, and that its activities are compliant with Articles 8 (right to privacy) and 10 (freedom of expression) of the European Convention of Human Rights.[86] However, the Tribunal stated in February 2015 that one particular aspect, the data-sharing arrangement that allowed UK Intelligence services to request data from the US surveillance programmes Prism and Upstream, had been in contravention of human rights law prior to this until two paragraphs of additional information, providing details about the procedures and safeguards, were disclosed to the public in December 2014.[91][92][93]

Furthermore, the IPT ruled that the legislative framework in the United Kingdom does not permit mass surveillance and that while GCHQ collects and analyses data in bulk, it does not practice mass surveillance.[86][94][95] This complements independent reports by the Interception of Communications Commissioner,[96] and a special report made by the Intelligence and Security Committee of Parliament; although several shortcomings and potential improvements to both oversight and the legislative framework were highlighted.[97]


Despite the inherent secrecy around much of GCHQ’s work, investigations carried out by the UK government after the Snowden disclosures have admitted various abuses by the security services. A report by the Intelligence and Security Committee (ISC) in 2015 revealed that a small number of staff at UK intelligence agencies had been found to misuse their surveillance powers, in one case leading to the dismissal of a member of staff at GCHQ, although there were no laws in place at the time to make these abuses a criminal offence.[98]

Later that year, a ruling by the Investigatory Powers Tribunal found that GCHQ acted unlawfully in conducting surveillance on two human rights organisations. The closed hearing found the government in breach of its internal surveillance policies in accessing and retaining the communications of the Egyptian Initiative for Personal Rights and the Legal Resources Centre in South Africa. This was only the second time in the IPT’s history that it had made a positive determination in favour of applicants after a closed session.[99]

At another IPT case in 2015, GCHQ conceded that “from January 2010, the regime for the interception/obtaining, analysis, use, disclosure and destruction of legally privileged material has not been in accordance with the law for the purposes of Article 8(2) of the European convention on human rights and was accordingly unlawful”.[100] This admission was made in connection with a case brought against them by Abdel Hakim Belhaj, a Libyan opponent of the former Gaddafi regime, and his wife Fatima Bouchar. The couple accused British ministers and officials of participating in their unlawful abduction, kidnapping and removal to Libya in March 2004, while Gaddafi was still in power.[101]

Surveillance of parliamentarians[edit]

In 2015 there was a complaint by Green Party MP Caroline Lucas that British intelligence services, including GCHQ, had been spying on MPs allegedly “in defiance of laws prohibiting it.”[102] GCHQ had introduced a policy in March 2015 that did not require approval by the Prime Minister, or any minister, before deliberately targeting the communications of a parliamentarian.

Then-Home SecretaryTheresa May, had told Parliament in 2014 that:

The Investigatory Powers Tribunal investigated the complaint, and ruled that contrary to the allegation, there was no law that gave the communications of parliament any special protection.[104] The Wilson Doctrine merely acts as a political convention.[105]

Constitutional legal case[edit]

A controversial GCHQ case determined the scope of judicial review of prerogative powers (the Crown’s residual powers under common law). This was Council of Civil Service Unions v Minister for the Civil Service [1985] AC 374 (often known simply as the “GCHQ case”). In this case, a prerogative Order in Council had been used by the prime minister (who is the Minister for the Civil Service) to ban trade union activities by civil servants working at GCHQ. This order was issued without consultation. The House of Lords had to decide whether this was reviewable by judicial review. It was held that executive action is not immune from judicial review simply because it uses powers derived from common law rather than statute (thus the prerogative is reviewable).[106]


The following is a list of the heads of the operational heads of GCHQ and GC&CS:

Stations and former stations[edit]

The following are stations and former stations that have operated since the Cold War.


Former stations:[108]

GCHQ Certified Training[edit]

The GCHQ Certified Training (GCT) scheme was established to certify two main levels of cyber security training. There are also degree and masters level courses. These are:

  • Awareness Level Training: giving an understanding and a foundation in cyber security concepts; and
  • Application Level Training: a more in-depth course

The GCT scheme was designed to help organisations find the right training that also met GCHQ’s exacting standards. It was designed to assure high quality cyber security training courses where the training provider had also undergone rigorous quality checks. The GCT process is carried out by APMG as the independent certification body. The scheme is part of the National Cyber Security Programme established by the Government to develop knowledge, skills and capability in all aspects of cyber security in the, and is based on the IISP Skills Framework.[109]

In popular culture[edit]

The historical drama film The Imitation Game (2014) featured Benedict Cumberbatch portraying Alan Turing‘s efforts to break the Enigma code while employed by the Government Code and Cypher School.[110]

GCHQ have set a number of cryptic online challenges to the public, used to attract interest and for recruitment, starting in late 1999.[111][112] The response to the 2004 challenge was described as “excellent”,[113] and the challenge set in 2015 had over 600,000 attempts.[114] It also published the GCHQ puzzle book in 2016 which sold more than 300,000 copies, with the proceeds going to charity. A second book was published in October 2018.[115]

See also[edit]

GCHQ units:

GCHQ specifics:

  • Capenhurst – said to be home to a GCHQ monitoring site in the 1990s
  • Hugh Alexander – head of the cryptanalysis division at GCHQ from 1949 to 1971
  • Operation Socialist, a 2010–13 operation in Belgium
  • Zircon, the 1980s cancelled GCHQ satellite project

UK agencies:


Notes and references[edit]

  1. ^ Intelligence and Security Committee of Parliament “Annual Report 2016–2017”, page 84. House of Commons (20 December 2017). Retrieved 1 June 2018.
  2. ^ House of Commons (5 July 2016). Intelligence and Security Committee of Parliament Annual Report 2015–2016, page 10. Retrieved 12 January 2017.
  3. ^ GCHQ – Welcome to GCHQ, Government of the United Kingdom. Retrieved 7 July 2014.
  4. ^ “A simple guide to GCHQ’s internet surveillance programme Tempora”Wired UK. 24 June 2013.
  5. ^ Borger, Julian (21 August 2013). “NSA files: why the Guardian in London destroyed hard drives of leaked files”The Guardian. Retrieved 27 May2018.
  6. ^ “MI5 veteran Jeremy Fleming named as new GCHQ head”. Sky News. Retrieved 21 March 2017.
  7. ^ Aldrich, 2010, p. 565
  8. ^ (secondary) Leong, Angela (2007). The Disruption of International Organised Crime: An Analysis of Legal and Non-Legal Strategies. Ashgate Publishing. ISBN 978-0-7546-7066-7. Retrieved 19 April 2012.
  9. ^ Gannon, Paul (2011). Inside Room 40: The Codebreakers of World War I. Ian Allan Publishing. ISBN 978-0-7110-3408-2.
  10. ^ Johnson, 1997, p. 27
  11. Jump up to:a b c d e f Johnson, 1997, p. 44
  12. ^ Johnson, 1997, p. 45 and Kahn, 1991, p. 82; these sources give different numbers for the initial size of the GC&CS staff
  13. ^ Macksey, Kenneth (2003). The Searchers: How Radio Interception Changed the Course of Both World Wars. Cassell Military. p. 58. ISBN 0-304-36545-9.
  14. ^ Smith, 2001, pp. 16–17
  15. ^ Kahn, 1991, p. 82
  16. ^ Denniston, Alastair G. (1986). “The Government Code and Cypher School Between the Wars”. Intelligence and National Security1 (1): 48–70. doi:10.1080/02684528608431841.
  17. ^ Smith, 2001, pp. 20–21
  18. ^ Smith, 2001, pp. 18–19
  19. ^ Aldrich, 2010, p. 18
  20. ^ Gannon, Paul (2006). Colossus: Bletchley Park’s Greatest Secret. Atlantic Books. ISBN 978-1-84354-331-2.
  21. ^ Alvarez, David (2001). “Most Helpful and Cooperative: GC&CS and the Development of American Diplomatic Cryptanalysis, 1941–1942”. In Smith, Michael; Erskine, Ralph (eds.). Action This Day: Bletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer. Bantam Press. ISBN 978-0593049105.
  22. ^ Erskine, Ralph; Smith, Michael, eds. (2011), The Bletchley Park Codebreakers, Biteback Publishing Ltd, ISBN 978-1-84954-078-0
  23. ^ “Mombasa was base for high-level UK espionage operation”. Coastweek. Retrieved 25 February 2018.
  24. ^ Smith, Michael (1998). Station X. Channel 4 books. p. 176. ISBN 0-330-41929-3.
  25. ^ “History of GCHQ Cheltenham”GCHQ website ‘About Us’ pages. Archived from the original on 5 October 2006. Retrieved 29 June 2006.
  26. ^ Duncan Campbell; Mark Hosenball (21 May 1976). “The Eavesdroppers”(PDF)Time Out. Retrieved 1 March 2016.
  27. ^ Court ruling, “R v Secretary of State for the Home Department, ex parte Hosenball“, [1977] 1 W.L.R. 766; [1977] 3 All E.R. 452. Lord Denning presiding judge, 29 March 1977.
  28. ^ Aldrich, 2010, p. 382
  29. ^ Murray, Craig (16 October 2007). Dirty Diplomacy. Scribner. p. 332. ISBN 978-1416548010.
  30. ^ “EComHR Inadmissibility decision of EComHR on application no. 11603/85”. 1987.
  31. ^ “EComHR Inadmissibility decision of EComHR on application no. 11603/85 – The Facts”. para. IV
  32. ^ “Union representation”GCHQ website. Archived from the original on 9 May 2006. Retrieved 12 April 2006.
  33. ^ “Sacked GCHQ workers win compensation”BBC News. 1 February 2000. Retrieved 12 April 2006.
  34. ^ “ISC – About”The Intelligence and Security Committee of Parliament – About the Committee. Intelligence and Security Committee of Parliament. Retrieved 1 December 2013.
  35. ^ “Intelligence Services Act 1994”. The National Archives. Retrieved 1 December 2013.
  36. ^ “Hansard: December 1993 Intelligence Services Bill”Hansard. 9 December 1993.
  37. ^ Aldrich 2010, p. 483
  38. ^ Aldrich 2010, p. 493
  39. ^ Aldrich 2010, p. 494
  40. ^ UK Retail Price Index inflation figures are based on data from Clark, Gregory (2017). “The Annual RPI and Average Earnings for Britain, 1209 to Present (New Series)”MeasuringWorth. Retrieved 27 January 2019.
  41. Jump up to:a b c Aldrich 2010, p. 495
  42. Jump up to:a b Aldrich 2010, p. 505
  43. Jump up to:a b c Aldrich 2010, p. 496
  44. ^ Aldrich 2010, p. 9
  45. ^ Aldrich 2010, p. 475
  46. Jump up to:a b Nigel West (31 August 2012). Historical Dictionary of Signals Intelligence. Scarecrow Press. pp. 27–. ISBN 978-0-8108-7391-9.
  47. ^ Aldrich 2010, p. 473
  48. ^ Aldrich 2010, p. 489
  49. ^ “Carillion set for growth”BBC News. 19 September 2000.
  50. ^ Aldrich, 2010, p. 521
  51. ^ Campbell, Duncan (1981). “Phone tappers and the state”. New Statesman: 54.
  52. ^ Aldrich, 2010, p. 471
  53. ^ Cavalier’ GCHQ online spy centre loses 35 laptops”Computerworld UK. 12 March 2010.
  54. ^ The GuardianGCHQ intercepted foreign politicians’ communications at G20 summits, 16 June 2013
  55. ^ Philip Bump (21 June 2013). “The UK Tempora Program Captures Vast Amounts of Data – and Shares with NSA”. The Atlantic Wire. Retrieved 23 June 2013.
  56. ^ “Statement on GCHQ’s Alleged Interception of Communications under the US PRISM Programme” (PDF). Intelligence and Security Committee of Parliament. 17 July 2013. Retrieved 17 December 2013.
  57. ^ “Scale and significance of NSA snooping claims”. BBC. 11 June 2013.
  58. ^ Ackerman, Spencer; Ball, James (28 February 2014). “Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ”The Guardian. Retrieved 2 March 2014.
  59. ^ “Snowden Docs: British Spies Used Sex and ‘Dirty TricksNBC News. 7 February 2014. Retrieved 7 February 2014.
  60. ^ “The Snowden Files: British Spies Used Sex and ‘Dirty’ Tricks” (PDF)NBC News Investigations. NBC. Retrieved 5 April 2015.
  61. ^ Robert Hannigan (3 November 2014). “The web is a terrorist’s command-and-control network of choice”Financial Times. Retrieved 3 November2014.
  62. ^ Sam Jones and Murad Ahmed (3 November 2014). “Tech groups aid terror, says UK spy chief”Financial Times. Retrieved 3 November 2014.
  63. ^ David Barrett (4 November 2014). “Tech giants reject GCHQ boss Robert Hannigan’s call for deal with government”The Daily Telegraph. Retrieved 5 November 2014.
  64. Jump up to:a b c Ryan Gallager, Profiled: From Radio to Porn, British Spies Track Web Users’ Online IdentitiesThe Intercept (25 September 2015).
  65. ^ Croft, Jane (1 December 2015) UK spy agency GCHQ admits it carries out computer hackingFinancial Times
  66. ^ Farrell, Henry (16 March 2017) Sean Spicer just suggested that Obama used British intelligence to spy on Trump. Not so muchThe Washington Post
  67. ^ Blake, Aaron (16 March 2017) Sean Spicer’s angry, lonely defense of Trump’s wiretapping claim, annotatedThe Washington Post
  68. ^ “US makes formal apology to Britain after White House accuses GCHQ of wiretapping Trump Tower”The Telegraph. 17 March 2017. Retrieved 17 March 2017.
  69. ^ “White House apologizes to British government over spying claims”. CNN. 17 December 2017. Retrieved 17 March 2017.
  70. ^ “GCHQ dismisses ‘utterly ridiculous’ claim it helped wiretap Trump | US news”The Guardian. 17 March 2017. Retrieved 13 April 2017.
  71. ^ Harding, Luke; Kirchgaessner, Stephanie; Hopkins, Nick (13 April 2017). “British spies were first to spot Trump team’s links with Russia”The Guardian. Retrieved 13 April 2017.
  72. ^ “British intelligence passed Trump associates’ communications with Russians on to US counterparts”. CNN. 14 April 2017. Retrieved 14 April2017.
  73. ^ “GCHQ (@gchq) • Instagram photos and videos”www.instagram.com. Retrieved 1 November 2018.
  74. ^ Weaver, Matthew (31 October 2018). “GCHQ uses Instagram to ‘open up world of espionage’ to public”the Guardian. Retrieved 1 November 2018.
  75. Jump up to:a b c d e f g h i “Operational Selection Policy OSP8” (PDF). Retrieved 24 January 2018.
  76. ^ “Heilbronn Institute for Mathematical Research”University of Bristol. Retrieved 30 August 2008.
  77. ^ “CESG Service Catalogue”. Retrieved 17 August 2015.
  78. ^ Singh, Simon“Unsung Heroes of Cryptography”. (originally published in The Sunday Telegraph)
  79. ^ “About us”. National Cyber Security Centre. Retrieved 9 March 2017.
  80. ^ Newmark, Peter (1991). About Translation. Multilingual Matters. p. 40. ISBN 1-85359-118-1.
  81. ^ Joint Technical Language Service. Russian-English Military Dictionary (English and Russian Edition). The Stationery Office. ISBN 9780112300199.
  82. ^ “Government Communications Headquarters, Cheltenham; Joint Technical Language Service”. National Archives. Retrieved 25 February 2018.
  83. ^ Schmid, Gerhard (11 July 2001). “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system) – Temporary Committee on the ECHELON Interception System, (2001/2098(INI))” (PDF). European Parliament: Temporary Committee on the ECHELON Interception System. p. 194. Retrieved 27 March 2008.
  84. ^ “Intelligence Services Act 1994”. Government of the United Kingdom. Retrieved 28 September 2015.
  85. ^ “The Law”. GCHQ. Retrieved 17 December 2013.
  86. Jump up to:a b c “GCHQ does not breach human rights, judges rule”. BBC. 5 December 2014. Retrieved 6 December 2014.
  87. ^ “The Andrew Marr Show Interview: Theresa May, MP Home Secretary”(PDF). BBC. 23 November 2014. Retrieved 6 December 2014Well I guess what he’s talking about is the fact that for certain aspects and certain of the more intrusive measures that our security service and police have available to them – i.e. Intercept, intercepting people’s telephones and some other intrusive measures – the decision is taken by the Secretary of State, predominantly me. A significant part of my job is looking at these warrants and signing these warrants. I think it’s… Some people argue that should be to judges….I think it’s very important that actually those decisions are being taken by somebody who is democratically accountable to the public. I think that’s an important part of our system. I think it’s a strength of our system.
  88. ^ “The Intelligence and Security Committee of Parliament”. Retrieved 14 December 2013.
  89. ^ “Functions – Key role”. The Investigatory Powers Tribunal. Archived from the original on 6 February 2015. Retrieved 6 February 2015.
  90. ^ “Intelligence Commissioners”. Retrieved 14 December 2013.
  91. ^ “IPT Ruling on Interception”. GCHQ. Archived from the original on 6 February 2015. Retrieved 6 February 2015.
  92. ^ “GCHQ censured over sharing of internet surveillance data with US”. BBC. 6 February 2015. Retrieved 6 February 2015.
  93. ^ “UK-US surveillance regime was unlawful ‘for seven yearsThe Guardian. 6 February 2015. Retrieved 6 February 2015.
  94. ^ “IPT rejects assertions of mass surveillance”. GCHQ. 5 December 2014. Retrieved 7 February 2015.
  95. ^ “List of judgments”. Investigatory Powers Tribunal. 5 December 2014. Archived from the original on 6 February 2015. Retrieved 7 February 20151. A declaration that the regime governing the soliciting, receiving, storing and transmitting by UK authorities of private communications of individuals located in the UK which have been obtained by US authorities pursuant to Prism and/or Upstream does not contravene Articles 8 or 10 ECHR. 2. A declaration that the regime in respect of interception under ss8(4), 15 and 16 of the Regulation of investigatory Powers Act 2000 does not contravene Articles 8 or 10 ECHR and does not give rise to unlawful discrimination contrary to Article 14, read together with Articles 8 and/or 10 of the ECHR.
  96. ^ “Statement by the Interception of Communications Commissioner’s Office (IOCCO) on the publication of the Interception of Communications Commissioner’s Report 2014” (PDF). 12 March 2015. Retrieved 14 March2015.“Report of the Interception of Communications Commissioner” (PDF). March 2015. Retrieved 14 March 2015.
  97. ^ “Privacy and Security: A modern and transparent legal framework”. Intelligence and Security Committee of Parliament. 12 March 2015. Retrieved 14 March 2015.“UK surveillance ‘lacks transparency’, ISC report says”. BBC. 12 March 2015. Retrieved 14 March 2015.“Intelligence and security committee report: the key findings”The Guardian. 12 March 2015. Retrieved 14 March 2015.
  98. ^ “Handful of UK spies accessed private information inappropriately, ISC says”The Guardian. 12 March 2015. Retrieved 31 December 2016.
  99. ^ “UK: Unlawful spying on two organisations reinforces need for intelligence services to end mass surveillance”Amnesty International UK. 22 June 2015. Retrieved 31 December 2016.
  100. ^ “Case No. IPT/13/132-9/H IN THE INVESTIGATORY POWERS TRIBUNAL” (PDF). The Investigatory Powers Tribunal. 26 February 2015. Retrieved 31 December 2016.
  101. ^ “Legal privilege and the conflicting interests of GCHQ and the IPT”The Guardian. 16 March 2015. Retrieved 31 December 2016.
  102. ^ “British intelligence service spying on MPs in defiance of laws prohibiting it”The Independent. 23 July 2015. Retrieved 31 December 2016.
  103. ^ “Daily Hansard – Debate, 15 July 2014 : Column 697”Parliament of the United Kingdom. 15 July 2014. Retrieved 31 December 2016.
  104. ^ Thomas Tamblyn (14 October 2015). “GCHQ Can Monitor Communications Of MPs And Peers Rules Tribunal”Huffington Post.
  105. ^ “Approved Judgment” (PDF). Investigatory Powers Tribunal. Retrieved 24 January 2018.
  106. ^ “UKHL 9”. United Kingdom House of Lords Decisions. Retrieved 25 February 2018.
  107. ^ “Life at GCHQ | GCHQ”www.gchq-careers.co.uk. Retrieved 5 April2019.
  108. ^ Information, Reed Business (5 April 1984). “How Cheltenham entered America’s backyard”New Scientist. Retrieved 12 December 2014.
  109. ^ “GCHQ Certified Training (GCT)”. APMG. Retrieved 18 April 2018.
  110. ^ Thorpe, Vanessa (15 November 2014). “Benedict Cumberbatch to inspire the next generation of codebreakers”The Observer. Retrieved 6 December 2014.
  111. ^ “Puzzling entrance to world of spies”BBC NEWS. 13 January 2000.
  112. ^ Caroline Byrne (15 January 2000). “The Spy Who Solved Me”ABC News.
  113. ^ “Huge response to spy base puzzle”BBC NEWS. 10 July 2004.
  114. ^ Gordon Rayner (4 February 2016). “GCHQ quiz solution: the full answers – but can you understand them?”The Daily Telegraph.
  115. ^ Ewen MacAskill (3 August 2018). “I spy … another fiendishly difficult GCHQ puzzle book”The Guardian.


  • Aldrich, Richard J. (2010). GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. HarperCollins. ISBN 978-0007278473.
  • Johnson, John (1997). The Evolution of British Sigint: 1653–1939. HMSO. ASIN B002ALSXTC.
  • Kahn, David (1991). Seizing the Enigma: The Race to Break the German U-Boats Codes, 1939–1943. Houghton Mifflin. ISBN 978-0395427392.
  • Smith, Michael (2001). “GC&CS and the First Cold War”. In Smith, Michael; Erskine, Ralph (eds.). Action This Day: Bletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer. Bantam Press. ISBN 978-0593049105.

External links[edit]