US Defense Contractors Stole Images From UK Secret Surveillance Station

Croughton is home to the USAF 501st Combat Support Wing (pictured).

In 2013, RAF Croughton was implicated in routing back to Washington the NSA phone tap on German chancellor Angela Merkel. 

In March 2016, a major upgrade to RAF Croughton's Satellite Communications (SATCOM) was revealed when the UK Defence Infrastructure Organisation (DIO) and prime contractors Mott MacDonald and HLM Architects submitted a very detailed planning application to South Northamptonshire Council.

The plans show a new windowless mission building "PL1" (Priority Level 1) and an antenna field comprising six new "golf ball" radomes, to provide the next generation of US DoD command and control data and voice lines to military operations.
This is known collectively as the Joint Intelligence Analysis Complex (JIAC).

In a major embarrassment to US and UK military authorities, Mott MacDonald and HLM Architects decided it would be a good idea to lift from this website an exclusive copyright protected aerial image of the existing antenna radomes at RAF Croughton, without prior permission, payment or even any accreditation (pictured).

It is used in Section 2.3, "Site Analysis" of the application's Design and Access Statement document, complete with protective watermarking. 

Alan Turnbull, a security researcher who operates the website Secret-Bases.co.uk, approached senior management at each company for comment in early December 2017. They refused to respond to emails and calls for almost a week, until finally being prompted by an approach by technology news outlet The Register, eager to run a story. It made it to infamous rogue US secrecy-busting website Cryptome, with the headline "RAF Croughton spies caught"!

Imagine the newspaper headlines dropping on someone's desk in Whitehall: "US Department of Defense contractors steal from UK Secret Bases website". So much for the "special relationship".  

More seriously, it is concerning that major defence contractors with such lucrative projects have such a poor grasp of corporate governance and due diligence procedures. 

Summary and Conclusions. Serial offenders, it seems, and US DoD / UK MoD seem quite happy to deal with contractors who don't bother with time consuming concepts like "due diligence".

Secret Bases:

You Might Also Read: 

Pentagon ‘Misleads’ Over Location of UK Intelligence Centre:

"Torus" Reveals an Expansion in 5 Eyes Surveillance:

Israeli Drone Hacked By Five Eyes Intelligence:
 

« Ethiopian Cyber Spies Left Clues Behind
Very Few Women Are CISOs »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.