Feeds

Jacqui's secret plan to 'Master the Internet'

'Climb down' on central database was 'a sideshow'

High performance access to file storage

Spy chiefs are already spending hundreds of millions of pounds on a mass internet surveillance system, despite Jacqui Smith's announcement earlier this week that proposals for a central warehouse of communications data had been dumped on privacy grounds.

The system - uncovered today by The Register and The Sunday Times - is being installed under a GCHQ project called Mastering the Internet (MTI). It will include thousands of deep packet inspection probes inside communications providers' networks, as well as massive computing power at the intelligence agency's Cheltenham base, "the concrete doughnut".

Sources with knowledge of the project said contracts have already been awarded to private sector partners.

One said: "In MTI, computing resources are not measured by the traditional capacities or speeds such as Gb, Tb, Megaflop or Teraflop... but by the metric tonne!.. and they have lots of them."

The American techology giant Lockheed Martin is understood to have bagged a £200m deal. The BAE-owned British firm Detica, which has close links to MI5 and MI6, as well as to GCHQ, has also been signed up to help on MTI.

A spokeswoman for GCHQ said the agency does not comment on individual contracts. "GCHQ works with a broad range of industry partners to deliver a complex portfolio of technical projects," she said. Detica also declined to comment, and Lockheed Martin did not return calls.

Sources said MTI received approval and funding of more than £1bn over three years in the October 2007 Comprehensive Spending Review. GCHQ, like MI5 and MI6, is funded out of the opaque Single Intelligence Account. For 2007/8 the planned budget for the three agencies was over £1.6bn.

GCHQ began work on MTI soon after it was approved. Records of job advertising by the agency show that in April 2008 it was seeking a Head of Major Contracts with "operational responsibility for the ‘Mastering the Internet’ (MTI) contract". The new senior official was to be paid an annual salary of up to £100,000.

The advertisement also indicated that the head of Major Contracts would be in charge of procurement on MTI and be expected to forge close links with the private sector.

According to sources, MTI is a core piece of the government's Interception Modernisation Programme (IMP). On Monday of last week, the Home Secretary Jacqui Smith announced that under IMP, rather than build a central warehouse, responsibility for storing details of who contacts whom, when and where will be imposed on communications providers.

The news was welcomed by privacy advocates and civil liberties campaigners, but sources described it as a "side show" compared to the massively increased surveillance capability that MTI will deliver. It will grant intelligence staff in Cheltenham complete visibility of UK Internet traffic, allowing them to remotely configure their deep packet inspection probes to intercept data - both communications data and the communication content - on demand.

Shami Chakrabarti, director of Liberty, said: "We opposed the big brother database because it gave the state direct access to everybody’s communications. But this network of black boxes achieves the same thing via the back door."

GCHQ's spokeswoman said: "GCHQ does not discuss 'how' we use data, as this may lead to revelations about our capability which damage national security.

"GCHQ is constantly updating its systems in order to maintain and renew its capability."

Advocates of MTI and IMP say they are essential if intelligence agencies are to maintain their capability to monitor terrorist and other criminal networks.

A Home Office consultation on the storage of communications data is now open. Meanwhile, work and spending on the all-seeing system to intercept and retrieve it is already underway. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.