{"id":54789,"date":"2023-12-06T14:32:16","date_gmt":"2023-12-06T14:32:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35269\/Inside-The-Secret-Complex-Making-High-Tech-Gadgets-For-UK-Spies.html"},"modified":"2023-12-06T14:32:16","modified_gmt":"2023-12-06T14:32:16","slug":"inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/","title":{"rendered":"Inside The Secret Complex Making High-Tech Gadgets For UK Spies"},"content":{"rendered":"<p><!--$--><!--$--><!--\/$--><noscript><\/noscript><!--$!--><!--\/$--><\/p>\n<header class=\"sc-4f17f115-0 cBbuYz\"><\/header>\n<nav data-testid=\"level1-navigation-container\" class=\"sc-ba4a1d3a-9 iiUkzy\">\n<section class=\"sc-ba4a1d3a-0 fgWTwx\">\n<nav class=\"sc-ba4a1d3a-1 hJNhsM\"><\/nav>\n<\/section>\n<\/nav>\n<p><noscript><\/p>\n<nav data-testid=\"level1-navigation-container\" class=\"sc-ba4a1d3a-9 iiUkzy\">\n<section class=\"sc-ba4a1d3a-0 fXIgdM\">\n<nav class=\"sc-ba4a1d3a-1 hJNhsM\"><\/nav>\n<\/section>\n<\/nav>\n<p><\/noscript><noscript><\/p>\n<details class=\"sc-ad70e5ac-0 iHSUEr\">\n<summary class=\"sc-ad70e5ac-2 iCcHiA\"><!--$--><svg viewBox=\"0 0 32 32\" width=\"20\" height=\"20\" category=\"actions\" icon=\"list-view-text\" class=\"sc-1097f7fe-0 jmthjj\"><path d=\"M1 7.5h30V1.9H1v5.6zm0 22.6h30v-5.6H1v5.6zm0-11.3h30v-5.6H1v5.6z\" \/><\/svg><!--\/$--><\/summary>\n<\/details>\n<p><\/noscript><\/p>\n<section data-component=\"headline-block\" class=\"sc-4e574cd-0 idepyX\"><\/section>\n<section data-component=\"timestamp-block\" class=\"sc-4e574cd-0 dIyQzT\"><!--$!--><!--\/$--><\/section>\n<section data-component=\"byline-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"1.5\">\n<div data-testid=\"byline\" class=\"sc-d63d5cd8-0 dYWGmX\" readability=\"8\">\n<p><span data-testid=\"byline-name\" class=\"sc-d63d5cd8-3 jEgnmo\">By Gordon Corera<\/span><span data-testid=\"byline-role\" class=\"sc-d63d5cd8-4 hnYIA-D\">Security correspondent, BBC News<\/span><\/p>\n<\/div>\n<\/section>\n<section data-component=\"image-block\" class=\"sc-4e574cd-0 fJflFe\">\n<div data-testid=\"hero-image\" class=\"sc-a898728c-1 jWZsJP\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a898728c-0 haCQWq\"><img decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/$recipe\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/A1E3\/production\/_131934414_mediaitem131931863.jpg.webp 1536w\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" loading=\"lazy\" alt=\"Alamy An aerial view of Hanslope Park near Milton Keynes\" class=\"sc-a898728c-0 kbvxap\"><span class=\"sc-a898728c-2 gnKCKH\">Alamy<\/span><\/div>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\"><b class=\"sc-7dcfb11b-0 kVRnKf\">Hidden behind five rings of barbed wire in a park just outside Milton Keynes lies no ordinary manufacturing workshop. It has never opened its doors to the media in its 85-year history &#8211; until now. <!-- --><\/b><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">At His Majesty&#8217;s Government Communications Centre (HMGCC) at Hanslope Park, what appear to be everyday objects are produced. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"5\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">But that is far from the full story &#8211; with a history involving codebreaker Alan Turing, sealed rooms, and comparisons to top-secret gadgets from James Bond films.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">The reason for the tight security? These objects are made for the UK&#8217;s spies and help to disguise their work.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">With the BBC given exclusive access to its sprawling facility, our phones have to be handed in and security staff accompany us at all times. <!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">We get a glimpse &#8211; but not much more &#8211; of what goes on inside as HMGCC seeks to build new partnerships to stay ahead in the spy game.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"6\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;We&#8217;ve made it really difficult for people to connect with us and that, through our history, has been a really good way of working,&#8221; explains CEO George Williamson. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"2\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">But he says it is now time to change &#8211; even if that does feel &#8220;strange&#8221;.<!-- --><\/p>\n<\/section>\n<section data-component=\"unordered-list-block\" class=\"sc-4e574cd-0 hJWXXD\"><\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">With its anonymous-looking buildings, the place looks like an industrial estate. <!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"7\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">Engineers, physicists, chemists, designers, coders and other specialists work on what is described rather hazily as a &#8220;mix of artistry and engineering&#8221;.<!-- --><\/p>\n<\/section>\n<section data-component=\"image-block\" class=\"sc-4e574cd-0 dMVnbQ\">\n<div data-testid=\"image\" class=\"sc-a898728c-1 jWZsJP\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a898728c-0 haCQWq\"><img decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/$recipe\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/4595\/production\/_131931871_9acb44c7-52f0-49f9-9581-70f9af744d74.jpg.webp 1536w\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" loading=\"lazy\" alt=\"Alamy Barbed wire and security cameras at Hanslope Park\" class=\"sc-a898728c-0 kbvxap\"><span class=\"sc-a898728c-2 gnKCKH\">Alamy<\/span><\/div>\n<\/section>\n<section data-component=\"caption-block\" class=\"sc-4e574cd-0 dIyQzT\"><span class=\"sc-cdeb84b0-0 jzQflC\">Security is tight at Hanslope Park<!-- --><\/span><\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"7\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">In some areas we have to wear anti-static clothing, while in others we are shown a bewildering variety of machines. They include ones that make electronic circuit boards, laser cutters and 3D printers (labelled Darth Vader, Luke and Leia in a tribute to Star Wars).<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"6\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">But what exactly are the machines&#8217; creations used for? Part of the problem is that, despite my best efforts, no one will say. That is because the devices that come out the other end are highly classified.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">But you can get a clue from the past. HMGCC was created on the eve of World War Two when spies and diplomats in Europe needed to communicate secretly and securely with the UK. <!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">That led to the creation of covert radio systems which could be smuggled in a diplomatic pouch. Some of these were used by officials fleeing Warsaw as the Germans invaded Poland in 1939 to provide news of what was happening.<!-- --><\/p>\n<\/section>\n<section data-component=\"image-block\" class=\"sc-4e574cd-0 dMVnbQ\">\n<div data-testid=\"image\" class=\"sc-a898728c-1 jWZsJP\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a898728c-0 haCQWq\"><img decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/$recipe\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/15DB3\/production\/_131932598_gettyimages-1485119807.jpg.webp 1536w\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" loading=\"lazy\" alt=\"Getty Images Alan Turing\" class=\"sc-a898728c-0 kbvxap\"><span class=\"sc-a898728c-2 gnKCKH\">Getty Images<\/span><\/div>\n<\/section>\n<section data-component=\"caption-block\" class=\"sc-4e574cd-0 dIyQzT\"><span class=\"sc-cdeb84b0-0 jzQflC\">Alan Turing lived and worked at Hanslope Park during World War Two<!-- --><\/span><\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">By the time the war began, this evolved into building smaller radio sets which could be given to agents from MI6 who were parachuted behind enemy lines in occupied Europe to send back intelligence.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"5\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">During the war, Turing lived and worked at Hanslope Park. Most famous for breaking Nazi codes at nearby Bletchley Park, he worked at HMGCC to develop a device that could provide speech encryption.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"7\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">The existing system used by wartime leaders Winston Churchill and Franklin D Roosevelt weighed 50 tonnes. Turing&#8217;s prototype, Delilah, overlaid noise from a record turntable onto speech. It was portable, ahead of its time and is another clue to what is built there today.<!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"subheadline-block\" class=\"sc-4e574cd-0 idepyX\">\n<h2 class=\"sc-518485e5-0 hzREzk\">Modern-day spies<!-- --><\/h2>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;I suspect you can trace a timeline directly back to what was happening there 70 or 80 years ago,&#8221; Turing&#8217;s nephew Sir Dermot Turing tells the BBC. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"2\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;The need for secure communications hasn&#8217;t gone away.&#8221;<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">So how does this relate to the modern world? These days, undercover agents operating in what are called &#8220;denied areas&#8221; like Russia or Iran need to communicate. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"5\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">While HMGCC will not comment, other sources say modern-day spies rely on things like clandestine-burst transmitters. These can be made to look like ordinary objects and send information in fractions of a second. I am imagining that is what is made here &#8211; but no-one wants to say.<!-- --><\/p>\n<\/section>\n<section data-component=\"image-block\" class=\"sc-4e574cd-0 dMVnbQ\">\n<div data-testid=\"image\" class=\"sc-a898728c-1 jWZsJP\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a898728c-0 haCQWq\"><img decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/$recipe\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/184C3\/production\/_131932599_untitled-1.jpg.webp 1536w\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" loading=\"lazy\" alt=\"Car radio\" class=\"sc-a898728c-0 kbvxap\"><\/div>\n<\/section>\n<section data-component=\"caption-block\" class=\"sc-4e574cd-0 dIyQzT\"><span class=\"sc-cdeb84b0-0 jzQflC\">This car radio speaker is more than meets the eye<!-- --><\/span><\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"2\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">Another object I am shown provides a further clue to what HMGCC does. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"2\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">It is a car radio speaker dating back to the 1930s. Hidden in the back is a secret transmitter.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"7\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">Communication is one part of the job. But so, it seems, are concealed bugging and tracking devices although, again, officials remain extremely tight-lipped when I ask them.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"7\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;For most of our 85 years we have been producing secure communications systems that enable people in often difficult, dangerous, remote locations to communicate in secrecy back to the UK,&#8221; Mr Williamson says.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;For some of our domestic national security agencies, we may help with some of their investigative work producing technologies that help them do things like surveillance.&#8221;<!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"5\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">One of HMGCC&#8217;s customers is MI5, who may need to secretly listen to a suspect at their house in the UK, or track them in a vehicle. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">This could involve disguising a listening device as an everyday object that nobody would spot. Quite what that could be is something else no-one wants to discuss.<!-- --><\/p>\n<\/section>\n<section data-component=\"image-block\" class=\"sc-4e574cd-0 dMVnbQ\">\n<div data-testid=\"image\" class=\"sc-a898728c-1 jWZsJP\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a898728c-0 haCQWq\"><img decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/$recipe\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/026F\/production\/_131932600_corera---stargate-2.jpg.webp 1536w\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" loading=\"lazy\" alt=\"Gordon Corera stands next to Stargate at HMGCC\" class=\"sc-a898728c-0 kbvxap\"><\/div>\n<\/section>\n<section data-component=\"caption-block\" class=\"sc-4e574cd-0 dIyQzT\"><span class=\"sc-cdeb84b0-0 jzQflC\">Stargate, with its grey spikes, feels like being in a medieval torture chamber<!-- --><\/span><\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"6\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">The temptation is to say all of this is like Q branch from James Bond. Insiders say the comparison is not quite right &#8211; I assume because they do not make things that blow up, or cars with rocket launchers, but it is hard to be totally sure. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"6\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">In one room with a rubber floor, two members of staff are testing electrical devices to make sure they do not give anyone an unintended shock. Elsewhere, items made here are tested in extremes of heat and cold to make sure they can still transmit and receive.<!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"6\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">One of the stranger places I am shown is called Stargate, a sealed container lined with small grey foam spikes. When I am locked in, it feels a little like a modern version of a medieval torture chamber.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">The room has a turntable that moves a device around, with sensors testing what kind of pattern a particular communications device emits.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"5\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">That might help discover how likely it is to be spotted by a hostile state and also, perhaps, how to identify any devices they are using in your territory.<!-- --><\/p>\n<\/section>\n<section data-component=\"image-block\" class=\"sc-4e574cd-0 dMVnbQ\">\n<div data-testid=\"image\" class=\"sc-a898728c-1 jWZsJP\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a898728c-0 haCQWq\"><img decoding=\"async\" src=\"https:\/\/ichef.bbci.co.uk\/news\/$recipe\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/C8F3\/production\/_131934415_mediaitem131931318.jpg.webp 1536w\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" loading=\"lazy\" alt=\"George Williamson sitting in front of a HMGCC sign\" class=\"sc-a898728c-0 kbvxap\"><\/div>\n<\/section>\n<section data-component=\"caption-block\" class=\"sc-4e574cd-0 dIyQzT\"><span class=\"sc-cdeb84b0-0 jzQflC\">George Williamson hopes collaboration will lead to &#8220;something special&#8221;<!-- --><\/span><\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">Within some pretty strict limits, HMGCC is opening up because it knows new technology that could be vital to its mission is being developed in small start-ups and in academia. <!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">The technology could relate to fields far from national security &#8211; but there could be uses developers are unaware of.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"5\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">Previously, strict security would have made collaboration impossible, but the hope is it could now happen.<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;The idea is that we can take our engineers and their great ideas and put them in the same room as people from industry or academia,&#8221; Mr Williamson says. <!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"4\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">&#8220;In that magical moment when you have different ideas coming together, something really special will emerge.&#8221;<!-- --><\/p>\n<\/section>\n<section data-component=\"text-block\" class=\"sc-4e574cd-0 bhtqwj\" readability=\"3\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">But how that technology ends up being used is likely to remain as secret as almost everything else at this site.<!-- --><\/p>\n<\/section>\n<p><!--$!--><!--\/$--><\/p>\n<section data-component=\"tags\" class=\"sc-4e574cd-0 hJWXXD\"><\/section>\n<section data-testid=\"ohio-section-outer-3\" data-analytics-group=\"true\" data-analytics_group_name=\"ohio_section\" data-analytics_group_type=\"ohio-3\" data-analytics_group_position=\"1\" data-analytics_group_item_count=\"3\" class=\"sc-86aa332-1 iOkyKB\"><\/section>\n<section data-testid=\"alaska-section-outer\" data-analytics-group=\"true\" data-analytics_group_name=\"alaska_section\" data-analytics_group_type=\"alaska-5\" data-analytics_group_position=\"2\" data-analytics_group_item_count=\"5\" class=\"sc-86aa332-1 bPDMPD\"><\/section>\n<p><!--$--><\/p>\n<hr data-testid=\"main-footer-divider\" class=\"sc-ba224a1-2 sc-ba224a1-3 boQOzm fTBhwF\">\n<footer data-testid=\"main-footer\" class=\"sc-ba224a1-0 dzCnly\" readability=\"6.1490196078431\">\n<section class=\"sc-19b1eb93-0 hYxbtM\">\n<nav role=\"navigation\" aria-label=\"Footer navigation\"><\/nav>\n<\/section>\n<section class=\"sc-fb2f8b48-0 jvXgkQ\">\n<div class=\"sc-fb2f8b48-1 Cbpyy\"><button type=\"button\" class=\"sc-fb2f8b48-2 enKanj\">BBC in other languages<!-- --><\/button><\/div>\n<\/section>\n<hr class=\"sc-ba224a1-2 yUcMM\">\n<section class=\"sc-db176339-0 ilVVvM\">\n<nav><\/nav>\n<\/section>\n<div class=\"sc-ba224a1-1 cMQOuo\" readability=\"19.853598014888\">\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">Copyright 2023 BBC. All rights reserved.&nbsp;<!-- --><i class=\"sc-7dcfb11b-0 kKcaog\">&nbsp;<!-- --><\/i>The<!-- --><i class=\"sc-7dcfb11b-0 kKcaog\"> BBC <!-- --><\/i>is<!-- --><i class=\"sc-7dcfb11b-0 kKcaog\"> not responsible for the content of external sites.<!-- --><\/i>&nbsp;<!-- --><a target=\"_self\" href=\"https:\/\/www.bbc.co.uk\/editorialguidelines\/guidance\/feeds-and-links\" class=\"sc-c9299ecf-0 kUFdej\" rel=\"noopener\"><b class=\"sc-7dcfb11b-0 kVRnKf\">Read about our approach to external linking.<!-- --><\/b><\/a><\/p>\n<p class=\"sc-eb7bd5f6-0 gDEGTg\"><b class=\"sc-7dcfb11b-0 kVRnKf\">Beta Terms<!-- --><\/b> By using the Beta Site, you agree that such use is at your own risk and you know that the Beta Site may include known or unknown bugs or errors, that we have no obligation to make this Beta Site available with or without charge for any period of time, nor to make it available at all, and that nothing in these Beta Terms or your use of the Beta Site creates any employment relationship between you and us. The Beta Site is provided on an \u201cas is\u201d and \u201cas available\u201d basis and we make no warranty to you of any kind, express or implied.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 gDEGTg\">In case of conflict between these Beta Terms and the BBC Terms of Use these Beta Terms shall prevail.<!-- --><\/p>\n<\/div>\n<\/footer>\n<p><!--\/$--><!--$--><button class=\"sc-d2d98e04-0 bDkVIF\"><\/button><\/p>\n<div data-testid=\"drawer-background\" direction=\"left\" class=\"sc-d2d98e04-1 hgisAf\">\n<div class=\"sc-f67e2d82-0 hYTJTW\">\n<div data-testid=\"navigationPanel-navItem-level1\" class=\"sc-f67e2d82-5 hpFPKZ\">\n<div><button data-testid=\"level1NavButton-\/innovation\" class=\"sc-f67e2d82-2 hqnDbU\"><span data-testid=\"level1NavText-\/innovation\" class=\"sc-f67e2d82-3 lhGSRJ\">Innovation<\/span><\/button><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><!--\/$--><!--$!--><!--\/$--><!--\/$-->READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35269\/Inside-The-Secret-Complex-Making-High-Tech-Gadgets-For-UK-Spies.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54790,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[7020],"class_list":["post-54789","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentbritaincyberwarspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inside The Secret Complex Making High-Tech Gadgets For UK Spies 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside The Secret Complex Making High-Tech Gadgets For UK Spies 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-06T14:32:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Inside The Secret Complex Making High-Tech Gadgets For UK Spies\",\"datePublished\":\"2023-12-06T14:32:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/\"},\"wordCount\":1331,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png\",\"keywords\":[\"headline,government,britain,cyberwar,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/\",\"name\":\"Inside The Secret Complex Making High-Tech Gadgets For UK Spies 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png\",\"datePublished\":\"2023-12-06T14:32:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png\",\"width\":160,\"height\":90},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,britain,cyberwar,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentbritaincyberwarspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Inside The Secret Complex Making High-Tech Gadgets For UK Spies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside The Secret Complex Making High-Tech Gadgets For UK Spies 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/","og_locale":"en_US","og_type":"article","og_title":"Inside The Secret Complex Making High-Tech Gadgets For UK Spies 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-06T14:32:16+00:00","og_image":[{"url":"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Inside The Secret Complex Making High-Tech Gadgets For UK Spies","datePublished":"2023-12-06T14:32:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/"},"wordCount":1331,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png","keywords":["headline,government,britain,cyberwar,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/","url":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/","name":"Inside The Secret Complex Making High-Tech Gadgets For UK Spies 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png","datePublished":"2023-12-06T14:32:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies.png","width":160,"height":90},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/inside-the-secret-complex-making-high-tech-gadgets-for-uk-spies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,britain,cyberwar,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentbritaincyberwarspyware\/"},{"@type":"ListItem","position":3,"name":"Inside The Secret Complex Making High-Tech Gadgets For UK Spies"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54789"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54790"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}