Documents

Access: The Vision for 2013

Sep. 25 2015 — 9:34a.m.

/2
1/2

ACCESS: THE VISION SECRET In 2013, we will have access to, and make readily available, data of the highest value possible to facilitate cyber operations and to enable IA, Effects and SIGINT. We remain committed to the principles of the Tordella doctrine and will be delivering dynamic and responsive access services to meet fast-changing customer requirements, providing a global reach through our assets in Cheltenham and at Extended Enterprise locations, and through multi-partner collaboration, shaping, and special relationships with industry. We will be using the world’s biggest SIGINT engine to run cyber operations and to access better, more valued data for customers to make a real world difference. We will have exploited to the full our unique selling points of geography, partnerships, the UK’s legal regime and our skilled workforce. We will have used our optimised SIGINT engine to support IA and Effects operations globally. As well as accessing events and content, we will have expanded our capabilities and abilities to perform CNE exfiltration, eAD, beaconry and geo-location, as well as gathering environmental information and various forms of ‘Internet Pocket Litter’ (e.g. cookies, delete keys). These new capabilities and forms of data have the potential to become our most highly valued and prized data. Version 1.0 – July 2010 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on

SECRET Scale and Pace • Grow our Internet access to 800 10Gs • Transform to 40% UKbased / 60% overseas • Share challenges with 2nd/3rd Parties • Gain access to our most intractable and hard targets Legally • Necessity, proportionality and authorisation still apply ACCESS: THE STRATEGY Balance • Obtain the most valuable data • Use the best tools • Increase innovative and experimental work Innovatively and legally deliver the highest value data using our global reach, skill and partnerships Diversity, Integration, Co-operation • Access capabilities across all communications methods • Accesses act as force multipliers • Lower overall cost per unit of access Agility • Ready and able to respond at cyber pace • Meet enhanced security challenges • Better understand commercial trends Version 1.0 – July 2010 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on

Filters SVG