US Defense Contractors Stole Images From UK Secret Surveillance Station

Croughton is home to the USAF 501st Combat Support Wing (pictured).

In 2013, RAF Croughton was implicated in routing back to Washington the NSA phone tap on German chancellor Angela Merkel. 

In March 2016, a major upgrade to RAF Croughton's Satellite Communications (SATCOM) was revealed when the UK Defence Infrastructure Organisation (DIO) and prime contractors Mott MacDonald and HLM Architects submitted a very detailed planning application to South Northamptonshire Council.

The plans show a new windowless mission building "PL1" (Priority Level 1) and an antenna field comprising six new "golf ball" radomes, to provide the next generation of US DoD command and control data and voice lines to military operations.
This is known collectively as the Joint Intelligence Analysis Complex (JIAC).

In a major embarrassment to US and UK military authorities, Mott MacDonald and HLM Architects decided it would be a good idea to lift from this website an exclusive copyright protected aerial image of the existing antenna radomes at RAF Croughton, without prior permission, payment or even any accreditation (pictured).

It is used in Section 2.3, "Site Analysis" of the application's Design and Access Statement document, complete with protective watermarking. 

Alan Turnbull, a security researcher who operates the website Secret-Bases.co.uk, approached senior management at each company for comment in early December 2017. They refused to respond to emails and calls for almost a week, until finally being prompted by an approach by technology news outlet The Register, eager to run a story. It made it to infamous rogue US secrecy-busting website Cryptome, with the headline "RAF Croughton spies caught"!

Imagine the newspaper headlines dropping on someone's desk in Whitehall: "US Department of Defense contractors steal from UK Secret Bases website". So much for the "special relationship".  

More seriously, it is concerning that major defence contractors with such lucrative projects have such a poor grasp of corporate governance and due diligence procedures. 

Summary and Conclusions. Serial offenders, it seems, and US DoD / UK MoD seem quite happy to deal with contractors who don't bother with time consuming concepts like "due diligence".

Secret Bases:

You Might Also Read: 

Pentagon ‘Misleads’ Over Location of UK Intelligence Centre:

"Torus" Reveals an Expansion in 5 Eyes Surveillance:

Israeli Drone Hacked By Five Eyes Intelligence:
 

« Ethiopian Cyber Spies Left Clues Behind
Very Few Women Are CISOs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Barracuda Networks

Barracuda Networks

Barracuda provides a range of solutions covering network security, data storage, protection and disaster recovery.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.