{"id":21202,"date":"2018-12-06T14:49:08","date_gmt":"2018-12-06T14:49:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/"},"modified":"2018-12-06T14:49:08","modified_gmt":"2018-12-06T14:49:08","slug":"uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/","title":{"rendered":"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#8216;evolved&#8217;&#8230;"},"content":{"rendered":"<p>UK spies are planning to increase their use of bulk equipment interference, as the range of encrypted hardware and software applications they can&#8217;t tap into increases.<\/p>\n<p>Equipment interference (EI) \u2013 formerly known as computer network exploitation \u2013 is the phrase used for spies poking around in devices, like phones or computers, and media like USB sticks.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/11\/30\/theresa_may.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"theresa may https:\/\/www.flickr.com\/photos\/policyexchange\/10725847516\/in\/photostream\/ licensed under https:\/\/creativecommons.org\/licenses\/by\/2.0\/ \"\/><\/p>\n<h2 title=\"How far will it go? You'll have to ask the Home Secretary\">UK&#8217;s new Snoopers&#8217; Charter just passed an encryption backdoor law by the backdoor<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2016\/11\/30\/investigatory_powers_act_backdoors\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>It allows them to gather up info they claim would otherwise be &#8220;lost&#8221; as it can&#8217;t be obtained other ways \u2013 crucially, it means they can access encrypted data they cannot grab via the more traditional route of interception.<\/p>\n<p>At the time the Investigatory Powers Bill was passing through Parliament \u2013<a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/11\/30\/investigatory_powers_act_backdoors\/\">\u00a0it was signed into law in 2016<\/a> \u2013 EI hadn&#8217;t been used, but it was already seen an alternative to bulk interception.<\/p>\n<p>However, it was expected to be authorised through targeted or targeted thematic warrants; as then-independent reviewer of terrorism David Anderson wrote at the time, &#8220;bulk EI is likely to be only sparingly used&#8221;.<\/p>\n<p>Since then, though, GCHQ&#8217;s use of these bulk powers has &#8220;evolved&#8221;, according to a <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/761147\/Letter_from_the_Security_Minister_to_Dominic_Grieve_QC_MP_December_2018.pdf\">letter<\/a> (PDF) to members of parliament\u2019s Intelligence and Security Committee, by security minister Ben Wallace.<\/p>\n<p>During the passage of the Investigatory Powers legislation, he said, the government anticipated bulk EI warrants would be &#8220;the exception&#8221;, and &#8220;be limited to overseas &#8216;discovery&#8217; based EI operations&#8221;.<\/p>\n<p>But with encryption increasingly commonplace, the spies want the exception to edge towards becoming the rule.<\/p>\n<p>&#8220;Since the passage of the Bill, the communications environment has continued to evolve, particularly in terms of the range of hardware devices and software applications which need to be targeted,&#8221; Wallace said.<\/p>\n<p>&#8220;In addition, the deployment of less traditional devices, and usage of these technologies by individuals of interest has advanced significantly.&#8221;<\/p>\n<p>Wallace said GCHQ had reviewed &#8220;current operational and technical realities&#8221; and &#8220;revisited&#8221; its previous position.<\/p>\n<p>&#8220;It will be necessary to conduct a higher proportion of ongoing overseas focused operational activity using the bulk EI regime than was originally envisaged,&#8221; he said.<\/p>\n<p>This was predicted by David Anderson, QC <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/terrorismlegislationreviewer.independent.gov.uk\/wp-content\/uploads\/2016\/08\/Bulk-Powers-Review-final-report.pdf\">in his 2016 report (PDF)<\/a>, as he acknowledged that the logic of bulk interception could apply to bulk EI.<\/p>\n<p>&#8220;There will be foreign-focused cases where there is significant value to be gained, operationally, from it &#8211; but in which it won\u2019t be possible to make a sufficiently precise assessment to proceed on the basis of the thematic EU power,&#8221; he said.<\/p>\n<p>Anderson added that bulk EU would require &#8220;particularly rigorous and technically-informed oversight&#8221; from both the secretary of state and the judicial commissioners who form the other part of the recently introduced &#8220;double lock&#8221; mechanism.<\/p>\n<p>Wallace said in his letter that the government had told the Investigatory Powers Commissioner, Adrian Fulford, about the proposals, and that Fulford &#8220;has proposed enhanced post facto safeguards for this activity&#8221;.<\/p>\n<p>Writing on Twitter today, Anderson praised GCHQ&#8217;s transparency on the matter, but added that IPCO would need to investigate in more detail.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\" readability=\"4.6153846153846\">\n<p lang=\"en\" dir=\"ltr\">Admirable transparency by <a href=\"https:\/\/twitter.com\/GCHQ?ref_src=twsrc%5Etfw\">@GCHQ<\/a> to publish this: now it is for <a href=\"https:\/\/twitter.com\/IPCOffice?ref_src=twsrc%5Etfw\">@IPCOffice<\/a> to explore the issue in (inevitably classified) detail and to report their conclusions. <a href=\"https:\/\/t.co\/VBXylWndRJ\">https:\/\/t.co\/VBXylWndRJ<\/a><\/p>\n<p>\u2014 David Anderson (@bricksilk) <a href=\"https:\/\/twitter.com\/bricksilk\/status\/1070371731179741184?ref_src=twsrc%5Etfw\">December 5, 2018<\/a><\/p><\/blockquote>\n<p>Others countered that it suggested there were major concerns about the legality of the new practices.<\/p>\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\" data-lang=\"en\" readability=\"5.3469387755102\">\n<p lang=\"en\" dir=\"ltr\">That, and\/or there are chunky concerns as to the legality of the new practices. Cynic? Moi?<\/p>\n<p>\u2014 Thomas de la Mare (@thebrieftweet) <a href=\"https:\/\/twitter.com\/thebrieftweet\/status\/1070372343472623616?ref_src=twsrc%5Etfw\">December 5, 2018<\/a><\/p><\/blockquote>\n<p>Wallace&#8217;s letter insisted the interpretation was &#8220;fully in line&#8221; with the IP Act and the EI Code of Practice, and that the judicial double lock process would apply the additional controls and safeguards of the regime. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1792\/-6900\/five-steps-to-dealing-with-the-insider-threat?td=wptl1792\">Five steps to dealing with the insider threat<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/12\/06\/uk_gchq_bulk_equipment_interference\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admit they are upping their use of mass snooping UK spies are planning to increase their use of bulk equipment interference, as the range of encrypted hardware and software applications they can&#8217;t tap into increases.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":21203,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-21202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#039;evolved&#039;... 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#039;evolved&#039;... 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-06T14:49:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#8216;evolved&#8217;&#8230;\",\"datePublished\":\"2018-12-06T14:49:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/\",\"name\":\"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have 'evolved'... 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg\",\"datePublished\":\"2018-12-06T14:49:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#8216;evolved&#8217;&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have 'evolved'... 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/","og_locale":"en_US","og_type":"article","og_title":"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have 'evolved'... 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-06T14:49:08+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#8216;evolved&#8217;&#8230;","datePublished":"2018-12-06T14:49:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/","url":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/","name":"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have 'evolved'... 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg","datePublished":"2018-12-06T14:49:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/uk-spies-you-know-how-we-said-bulk-device-hacking-would-be-used-sparingly-well-things-have-evolved\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"UK spies: You know how we said bulk device hacking would be used sparingly? Well, things have &#8216;evolved&#8217;&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/21202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=21202"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/21202\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/21203"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=21202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=21202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=21202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}