Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Privacy Government

UK's GCHQ Intern Transferred Top Secret Files To His Phone (bbc.co.uk) 49

Bruce66423 shares a report from the BBC: A former GCHQ intern has admitted risking national security by taking top secret data home with him on his mobile phone. Hasaan Arshad, 25, pleaded guilty to an offence under the Computer Misuse Act on what would have been the first day of his trial at the Old Bailey in London. The charge related to committing an unauthorised act which risked damaging national security.

Arshad, from Rochdale in Greater Manchester, is said to have transferred sensitive data from a secure computer to his phone, which he had taken into a top secret area of GCHQ on 24 August 2022. [...] The court heard that Arshad took his work mobile into a top secret GCHQ area and connected it to work station. He then transferred sensitive data from a secure, top secret computer to the phone before taking it home, it was claimed. Arshad then transferred the data from the phone to a hard drive connected to his personal home computer.
"Seriously? What on earth was the UK's equivalent of the NSA doing allowing its hardware to carry out such a transfer?" questions Bruce66423.

UK's GCHQ Intern Transferred Top Secret Files To His Phone

Comments Filter:
  • by Linsaran ( 728833 ) on Monday March 31, 2025 @07:09PM (#65272847) Homepage
    The fact that a government agency doesn't have protections against this, when I can't even plug a thumb drive into my mere 'corporate' work PC is absurd.
  • Dumbass (Score:5, Funny)

    by newslash.formatblows ( 2011678 ) on Monday March 31, 2025 @07:29PM (#65272871)
    Should have stored it in his golden bathroom.
    • Re: (Score:2, Funny)

      by mike449 ( 238450 )

      Or sent to a Signal chat. This is apparently an approved way of handling national secrets as well.

  • Phones in GCHQ? (Score:4, Insightful)

    by Roger W Moore ( 538166 ) on Monday March 31, 2025 @07:30PM (#65272873) Journal
    Nevermind why the computers allowed such a transfer why did he even have his phone inside GCHQ in the first place? These things leak data and can be hijacked to record and upload information by other state actors - as GCHQ itself should know given that they have been accused of doing it themselves!

    I'd have expected that, unless you were working in a very low security area, you'd need to leave your phone in a Faraday cage locker at the gate/door. Frankly, you probably also need to do that with watches as well now since I'd be amazed if smart watches have not also been hacked to record and relay information.
  • Access problems (Score:4, Insightful)

    by jroysdon ( 201893 ) on Monday March 31, 2025 @07:42PM (#65272895)

    Why did the intern have access? Why was a smartphone allowed into an area with top secret files and without controls to block it from being connected? So many fails.

    • Re: Access problems (Score:4, Informative)

      by devslash0 ( 4203435 ) on Monday March 31, 2025 @08:14PM (#65272919)

      Possibly because the article says it was a work mobile. Perhaps that's why the device was pre-authorised to connect.

      • by Anonymous Coward

        Is that commonly allowed under UK security rules? As I understand it, the usual US security rules are that you're not supposed to bring any wireless devices into an area approved for SECRET or higher (laptops can be allowed with prior approval if wireless functions are switched off while inside, although usually they would prefer no wireless capabilities at all), and there should be pretty strict rules on what devices can plug into the computers there. If the phone was approved to connect to classified co

      • by evanh ( 627108 )

        I've work in a factory that wasn't classed secret in any way, but not even the work cellphones were allowed in the bulk of the factory let alone the high security areas. There was landline portable and desk phones for making work calls. Maintenance and supply chain staff had assigned desktop computers with web access within the factory secure zone.

        The only digital photo cameras allowed were the designated internal ones. Of which there was only two, afaik. Any contractors wanting to photo a piece of mach

        • Ditto.

          Any contractors wanting to photo a piece of machinery for repair had to use one of those two cameras and then email the photo.

          With a corollary that any contractors that complained about it were immediately ex-contractors and escorted from the locker room (where they were locking their phones, cameras etc away).

  • They are doing all they can to enforce 100 percent OPSEC.

  • Secret computers [do] record usb drive insertions.

    • ... if they have USB ports which aren't glued up. Also, USB headers on the motherboards, which are behind the intrusion-detection microswitch, beyond the case padlock.

      Every few months there's a report of some dude leaving his MI-several issue laptop full of "fun stuff" in the pub/ on a train ; in a taxi. They'll have a whole suite of additional protection, starting with encryption at the hard drive controller board.

  • Yes, do let an INTERN have access to TOP-SECRET information, unmonitored, and with USB ports just allowing anyone to copy TS data and exfiltrate it.

    I don't care what religion or race or color he is. He is an INTERN. He should not have TS clearance. He should not have unfiltered access to TS data. And then he left the building with it and took it home and put it on his PROBABLY WINDOWS MALWARE INFESTED PC, which is all Windows PCs (some being that way from the manufacturer).

    GCHQ is like the UK's NSA exce

  • by ledow ( 319597 )

    More worrying that it took a month between the offence and the arrest.

    If they'd grabbed him later that day, I could say "Ah, they clearly let him do it, all the alarm bells went off, but they wanted to see what he would do, and then arrested him before anything could happen to the data".

    But no. They didn't do anything to stop him until a month later.

  • WTF (Score:4, Funny)

    by bloodhawk ( 813939 ) on Tuesday April 01, 2025 @04:11AM (#65273377)
    WTF sort of incompetents do they hire, everyone knows once you get to top secret or above it should be signal.
    • WTF sort of incompetents do they hire,

      In EN_UK, "intern" implies that the person is not being paid. I'm not sure what it means exactly in EN_US.

      Which shouldn't be an issue - getting onto a site that covers "sensitive" and higher material will require one level of vetting, regardless of pay scale. Higher levels of vetting for "Secret", Top Secret", etc, with the same disregard of pay rate.

      Unless you're a politician, when a highly vetted person lets you see the documents, but not take your own notes. Until

  • I wonder if this would have made the news if the accused didn't have an exotic name?
  • by hyades1 ( 1149581 ) on Tuesday April 01, 2025 @09:03AM (#65273617)

    As a convicted felon who managed to achieve his first guilty plea just after his 25th birthday, a plea stemming from his commission of a security breach of truly jaw-dropping severity, Hasaan Arshad now satisfies all the criteria necessary to be named by Donald Trump as the next head of the NSA.

  • after all if its good enough for the presidents best and only the best people then ,,,
  • Normally, in the UK, if this has been a 'serious' security breach, proceedings would have been conducted behind closed doors and likely not even disclosed to the press or public. I would suspect that this is a security infraction but not as bad as many have assumed.
  • I am not a native English speaker, so I am a bit confused. I would call a person who takes top secret files home is a spy, but the summary is calling such a person an 'intern'.

As far as we know, our computer has never had an undetected error. -- Weisert

Working...