GCHQ has "over-achieved" at developing state hacking tools

The organisation has developed double the offensive cyber attacks than that of criminals

A report by the Intelligence and Security Committee said GCHQ spies have "over-achieved" in the last 12 months, developing twice as many potential hacks than its targets.

The GCHQ is developing these hacking capabilities to use against criminals when they launch cyber crimes. It means the UK government is prepared to attack another country's vital infrastructure, such as their communications systems or automated weapons.

There are three stages to the GCHQ's mission, the first of which has been completed ahead of schedule according to the Intelligence and Security Committee report.

"We actually over-achieved and delivered [almost double the number of] capabilities [we were aiming for]," an official from the agency told the Committee (via the BBC).

Advertisement
Advertisement - Article continues below

Although much of the information has been omitted from the public version of the Committee's report, it did reveal that not all attempts to create offensive cyber-weapons were successful. For example, the Foxtrot project was designed to combat encryption, with the project described as an "equipment interference programme to increase GCHQ's ability to operate in an environment of ubiquitous encryption".

However, a lack of skills in the specific area means it hasn't been able to complete the work and needs to find better resources to help it finish the project.

Also highlighted was Project Golf, which focuses on supercomputing and enhancing the government's data analysis to help combat threats, but its development has been halted until next year.

Similarly, the MI5's Alfa project, which has been designed to manage the organisation's information, has been delayed and "significant risks" are stopping it from being completed.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/cyber-security/33079/gchq-boss-says-uk-must-be-vigilant-againt-chinese-tech-firms
cyber security

GCHQ boss says UK must be vigilant againt Chinese tech firms

25 Feb 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/security/32470/gchq-opens-up-about-concealing-cyber-threats-from-global-community
Security

GCHQ keeps vulnerabilities a secret

30 Nov 2018

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019