US Defense Contractors Stole Images From UK Secret Surveillance Station

Croughton is home to the USAF 501st Combat Support Wing (pictured).

In 2013, RAF Croughton was implicated in routing back to Washington the NSA phone tap on German chancellor Angela Merkel. 

In March 2016, a major upgrade to RAF Croughton's Satellite Communications (SATCOM) was revealed when the UK Defence Infrastructure Organisation (DIO) and prime contractors Mott MacDonald and HLM Architects submitted a very detailed planning application to South Northamptonshire Council.

The plans show a new windowless mission building "PL1" (Priority Level 1) and an antenna field comprising six new "golf ball" radomes, to provide the next generation of US DoD command and control data and voice lines to military operations.
This is known collectively as the Joint Intelligence Analysis Complex (JIAC).

In a major embarrassment to US and UK military authorities, Mott MacDonald and HLM Architects decided it would be a good idea to lift from this website an exclusive copyright protected aerial image of the existing antenna radomes at RAF Croughton, without prior permission, payment or even any accreditation (pictured).

It is used in Section 2.3, "Site Analysis" of the application's Design and Access Statement document, complete with protective watermarking. 

Alan Turnbull, a security researcher who operates the website Secret-Bases.co.uk, approached senior management at each company for comment in early December 2017. They refused to respond to emails and calls for almost a week, until finally being prompted by an approach by technology news outlet The Register, eager to run a story. It made it to infamous rogue US secrecy-busting website Cryptome, with the headline "RAF Croughton spies caught"!

Imagine the newspaper headlines dropping on someone's desk in Whitehall: "US Department of Defense contractors steal from UK Secret Bases website". So much for the "special relationship".  

More seriously, it is concerning that major defence contractors with such lucrative projects have such a poor grasp of corporate governance and due diligence procedures. 

Summary and Conclusions. Serial offenders, it seems, and US DoD / UK MoD seem quite happy to deal with contractors who don't bother with time consuming concepts like "due diligence".

Secret Bases:

You Might Also Read: 

Pentagon ‘Misleads’ Over Location of UK Intelligence Centre:

"Torus" Reveals an Expansion in 5 Eyes Surveillance:

Israeli Drone Hacked By Five Eyes Intelligence:
 

« Ethiopian Cyber Spies Left Clues Behind
Very Few Women Are CISOs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.