Part of a series on |
Global surveillance |
---|
Disclosures |
Systems |
Agencies |
Places |
Laws |
Proposed changes |
Concepts |
Related topics |
Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time.[2] It was tested from 2008 and became operational in late 2011.[3]
Tempora uses intercepts on the fibre-optic cables that serve as the backbone of the Internet to gain access to large amounts of Internet users' personal data, without any individual suspicion or targeting. The intercepts are placed in the United Kingdom and overseas, with the knowledge of companies owning either the cables or landing stations.[4]
The existence of Tempora was revealed by Edward Snowden, a former American intelligence contractor who leaked information about the program to former Guardian journalist Glenn Greenwald in May 2013 as part of his revelations of government-sponsored mass surveillance programs. Documents Snowden acquired showed that data collected by the Tempora program is shared with the National Security Agency of the United States.[5]
Operation
According to Edward Snowden, Tempora has two principal components called "Mastering the Internet" (MTI) and "Global Telecoms Exploitation" (GTE). He claimed that each is intended to collate online and telephone traffic.[5] This contradicts two original documents, which say that Tempora is only for Internet traffic, just like the XKeyscore system of the NSA, components of which are incorporated in Tempora.[2][6]
It is alleged that GCHQ produces larger amounts of metadata than NSA. By May 2012, 300 GCHQ analysts and 250 NSA analysts had been assigned to sort data.[5]
The Guardian claims that no distinction is made in the gathering of data between public citizens and targeted suspects.[5] Tempora is said to include recordings of telephone calls, the content of email messages, Facebook entries and the personal Internet history of users. Snowden said of Tempora that "It's not just a U.S. problem. The U.K. has a huge dog in this fight...They [GCHQ] are worse than the U.S."[5]
Claims exist that Tempora was possible only by way of secret agreements with commercial companies, described in Snowden's leaked documents as "intercept partners". Some companies are alleged to have been paid for their co-operation. Snowden also alleged that GCHQ staff were urged to disguise the origin of material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".[5] The companies are forbidden to reveal the existence of warrants compelling them to allow GCHQ access to the cables. If the companies fail to comply they can be compelled to do so.[5]
Lawyers for GCHQ said it would be impossible to list the total number of people targeted by Tempora because "this would be an infinite list which we couldn't manage".[5]
GCHQ set up a three-year trial at GCHQ Bude in Cornwall. GCHQ had probes attached to more than 201 Internet links by mid-2011; each probe carried 10 gigabits of data a second.[5] NSA analysts were brought into the trials, and Tempora was launched in 2011, with data shared with the NSA. Ongoing technical work is expanding GCHQ's capacity to collect data from new super cables that carry data at 100 gigabits a second.[5] The data is preserved for three days while metadata is kept for thirty days.[1]
TEMPORA comprises different components, like the actual access points to fibre-optic cables, a sanitisation program codenamed POKERFACE, the XKEYSCORE system developed by NSA, and a Massive Volume Reduction (MVR) capability.[2]
In May 2012, GCHQ had TEMPORA systems installed at the following locations:[2]
- 16 for 10 gigabit/second cables at the CPC processing centre
- 7 for 10 gigabit/second cables at the OPC processing centre
- 23 for 10 gigabit/second cables at the RPC1 processing centre
Reactions
UK Defence officials issued a confidential DA-Notice to the BBC and other media asking the media to refrain from running further stories related to surveillance leaks including US PRISM program and the British involvement therein.[7]
The US Army has restricted its employees' access to the Guardian website since the beginning of the NSA leaks of PRISM and Tempora "in order to prevent an unauthorized disclosure of classified information."[8]
German Federal Minister of Justice Sabine Leutheusser-Schnarrenberger tweeted that she considered the program an "Alptraum" ("nightmare") and demanded that European Union institutions investigate the matter.[9][10]
Jan Philipp Albrecht, German Member of the European Parliament and spokesperson for Justice and Home Affairs of the Greens/EFA parliamentary group, called for an infringement procedure against the United Kingdom for having violated its obligations relating to the protection of individuals with regard to the processing of personal data under Article 16 of the Treaties of the European Union.[11]
In September 2018, the European Court of Human Rights ruled that the UK’s mass data interception and retention programmes, including TEMPORA, "was unlawful and incompatible with the conditions necessary for a democratic society".[12][13]
See also
- INDECT – European Union project
- Karma Police (surveillance program)
- List of government surveillance projects
- Mass surveillance in the United Kingdom
- MUSCULAR
- Signals intelligence
- Tempora mutantur – Latin adage
- UKUSA SIGINT Agreement
- NSA ANT catalog
- Communications Assistance for Law Enforcement Act (CALEA)
- Global surveillance disclosures (2013–present)
- Website visitor tracking
- Browsing history
- Web analytics
- Web mining
- Surveillance
- Internet privacy
References
- 1 2 Philip Bump (21 June 2013). "The UK Tempora Program Captures Vast Amounts of Data – and Shares with NSA". The Atlantic Wire. Retrieved 23 June 2013.
- 1 2 3 4 GCHQ report on the technical abilities of the powerful spying program TEMPORA, which allows for a "full take", released by Der Spiegel on 18 June 2014
- ↑ Shubber, Kadhim. "A simple guide to GCHQ's internet surveillance program Tempora". Wired. Retrieved 25 June 2013.
- ↑ Ball, James (25 October 2013). "Leaked memos reveal GCHQ efforts to keep mass surveillance secret". The Guardian. Retrieved 25 October 2013.
- 1 2 3 4 5 6 7 8 9 10 Ewen MacAskill; Julian Borger; Nick Hopkins; Nick Davies; James Ball (21 June 2013). "GCHQ taps fibre-optic cables for secret access to world's communications". The Guardian. London. Retrieved 21 June 2013.
- ↑ Report on the NSA’s access to TEMPORA, Released by Der Spiegel on 18 June 2014.
- ↑ Halliday, Josh (17 June 2013). "MoD serves news outlets with D notice over surveillance leaks". The Guardian. London. Retrieved 27 June 2013.
- ↑ Phillip Molnar (28 June 2013). "Restricted web access to The Guardian is Armywide, officials say". Monterey Herald. Archived from the original on 1 July 2013. Retrieved 28 June 2013.
- ↑ Politik (22 June 2013). "Leutheusser-Schnarrenberger: Justizministerin entsetzt über britisches Abhörprogramm". Der Spiegel (in German). Retrieved 3 July 2013.
- ↑ "Twitter / sls_bmj: #sls "#Tempora Alptraum a la". Twitter. Retrieved 3 July 2013.
- ↑ "Amerikanischer als die Amerikaner". jetzt.de (Süddeutsche). 23 June 2013.
- ↑ "Data protection, data flows, and Brexit". After Brexit. 19 October 2020. Retrieved 14 February 2021.
- ↑ Leprince-Ringuet, Daphne (13 September 2018). "The UK's mass surveillance regime has broken the law (again)". Wired UK. ISSN 1357-0978. Retrieved 14 February 2021.
External links
- TEMPORA - "The World's Largest XKEYSCORE" - Is Now Available to Qualified NSA Users, released by Der Spiegel on 18 June 2014
- MacAskill, Ewen; Borger, Julian; Hopkins, Nick; Davies, Nick; Ball, James (21 June 2013). "How does GCHQ's internet surveillance work?". The Guardian. London.
- Ball, James; Harding, Luke; Garside, Juliette (2 August 2013). "BT and Vodafone among telecoms companies passing details to GCHQ". The Guardian. Retrieved 2 November 2013.
- Schneier, Bruce (5 June 2014). "GCHQ Intercept Sites in Oman". Schneier on Security. Retrieved 11 June 2014.