Showing posts with label GCHQ. Show all posts
Showing posts with label GCHQ. Show all posts

Sunday, 21 January 2018

Direct evidence of British spying on Donald Trump

British Intelligence Spied on Donald Trump at the request of Barack Obama 

Hal Turner has written an article in which he claims to, through his contacts in Intelliogence to have got his hands on evidence that British GCHQ spied on the Trump team on behalf of the Americans

"On August 28, 2016, then-US-President Barack Hussein Obama requested that British Intelligence begin SPYING on then-candidate for US President, Donald J. Trump, the Trump Organization (his business entities) and on his Presidential Campaign "Donald J. Trump for President." The spying included foreign and US DOMESTIC signals Intercepts (SIGINT). This generally includes phone taps and planting of bugs/listening devices. They did all this without a U.S. Search Warrant or Court Order."

He says that on September 15, 2016, the British Government being run by Prime Minister Thersa May approved what they called "Operation FULSOME" and began spying on Donald Trump, his businesses and his Presidential campaign and that this spying contunued for about 90 days

"On November 17, 2017, nine days AFTER Donald Trump won the Presidential Election, then Director of GCHQ, Robert Hannigan, requested a RENEWAL of permission to continue the spying! Hannigan KNEW that Trump had won, and still sought permission to keep spying on him"

This letter was sent to Boris Johnson, the Secretary of State for foreign and Commonwealth Affairs and the operation presumbably had the approval of May.


"But this time, the continued spying wasn't sought by President Barack Obama directly. This time, it was sought by "US National Security Advisor (Susan) Rice", who told the British to continue the surveillance during the "Transition Period" before Trump was sworn-in. The reason given to the British by Susan Rice: ". . .internal US Intelligence is potentially compromised by the incoming Trump Administration." "

When none of this had any effect and Trump was inaugurated one of their men, Christopher Steele, concocted and released the phony "Russian Dossier" in an attempt to prevent Trump from being sworn-in or to wreck his Presidency before it could ever get started.

Turner gives as the real reason Trump is not going to the UK is that Britain spied on Trump inside the United States and that although he is going to Davos Trump will likely snub her.

Direct evidence for what critics have already known for some time is now coming home.

Hopefully this will not just stay as two competing narratives (one of which is full of lies and propaganda) but the revelations of the the secret memo will lead to the indictment and prsecution of some very corrupt indviduals.

Here is the top-secret document:




EXCLUSIVE: Six U.S Agencies Conspired to Illegally Wiretap Trump; British Intel Used as NSA Front to Spy on Campaign


17 January, 2018

From the beginning it was a set up to find dirt on Trump campaign insiders and if possible to topple Donald Trump’s presidential aspirations.

Before and after the 2016 election. And while this operation had many moving parts and alternating players, the mission to unseat Trump never changed. And it remains ongoing.

Paul Manafort was wiretapped. Cater Page was wiretapped. Donald Trump Jr. was wiretapped. Jared Kushner was wiretapped. Gen. Michael Flynn was wiretapped. And likely there were others.

And none of it was very legal.

In fact, most of it was very illegal, according to federal law enforcement sources who are blowing the whistle on a sweeping scheme to undermine the Executive branch and the electorate’s choice for president of the United States.

And according to high ranking FBI sources, the Bureau played a definitive role in plotting this sweeping privacy breach. But the FBI had much help from the NSA, CIA, the Office of of the Director of National Intelligence, Treasury financial crimes division under DHS, and the Justice Department, federal law enforcement sources confirmed.

The Deep State caretakers involved are familiar names: James Comey (FBI), John Brennan (CIA), James Clapper (ODNI), Loretta Lynch (DOJ), Jeh Johnson (DHS), Admiral Michael Rogers (NSA). And then-director of GCHQ Robert Hannigan who has since resigned from the esteemed British spy agency.

President Barack Obama’s White House too could be implicated, sources said. But while evidence certainly points to involvement of the Obama administration, sources said they did not have access to definitive intelligence proving such a link.

Here is what we now know, per intelligence gleaned form federal law enforcement sources with insider knowledge of what amounts to a plot by U.S. intelligence agencies to secure back door and illegal wiretaps of President Trump’s associates:

Six U.S. agencies created a stealth task force, spearhead by CIA’s Brennan, to run domestic surveillance on Trump associates and possibly Trump himself.

To feign ignorance and to seemingly operate within U.S. laws, the agencies freelanced the wiretapping of Trump associates to the British spy agency GCHQ.

The decision to insert GCHQ as a back door to eavesdrop was sparked by the denial of two FISA Court warrant applications filed by the FBI to seek wiretaps of Trump associates.

GCHQ did not work from London or the UK. In fact the spy agency worked from NSA’s headquarters in Fort Meade, MD with direct NSA supervision and guidance to conduct sweeping surveillance on Trump associates.

The illegal wiretaps were initiated months before the controversial Trump dossier compiled by former British spy Christopher Steele.

The Justice Department and FBI set up the meeting at Trump Tower between Trump Jr., Manafort and Kushner with controversial Russian officials to make Trump’s associates appear compromised.

Following the Trump Tower sit down, GCHQ began digitally wiretapping Manafort, Trump Jr., and Kushner.

After the concocted meeting by the Deep State, the British spy agency could officially justify wiretapping Trump associates as an intelligence front for NSA because the Russian lawyer at the meeting Natalia Veselnitskaya was considered an international security risk and prior to the June sit down was not even allowed entry into the United States or the UK, federal sources said.

By using GCHQ, the NSA and its intelligence partners had carved out a loophole to wiretap Trump without a warrant. While it is illegal for U.S. agencies to monitor phones and emails of U.S. citizens inside the United States absent a warrant, it is not illegal for British intelligence to do so. Even if the GCHQ was tapping Trump on U.S. soil at Fort Meade.

The wiretaps, secured through illicit scheming, have been used by U.S. Special Counsel Robert Mueller’s probe of alleged Russian collusion in the 2016 election, even though the evidence is considered “poisoned fruit.”

Veselnitskaya, the Russian lawyer who spearheaded the Trump Tower meeting with the Trump campaign trio, was previously barred from entering the United Sates due to her alleged connections to the Russian FSB (the modern replacement of the cold-war-era KGB).

Yet mere days before the June meeting, Veselnitskaya was granted a rare visa to enter the United States from Preet Bharara, the then U.S. Attorney for the southern district of New York. Bharara could not be reached for comment and did not respond the a Twitter inquiry on the Russian’s visa by True Pundit.

Replying to 
Mr. Bharara, Why did you sign off a rare visa allowing Ms. Veselnitskaya into the United States? She was banned by

Federal law enforcement sources said Bharara was simply following the orders of Attorney General Lynch, who lobbied the State Department to issue the disavowed Russian a B1/B2 non-immigrant visa. This permitted Veselnitskaya entry into the United States for the sole purpose of entrapping Trump associates to use as fuel to commission wiretaps, federal sources said.

Veselnitskaya may have been paid as well by the U.S. government, FBI sources said. It was reported last week that Steele, who compiled the Trump dossier was paid at least $100,000 from FBI funds as well. But that came later, after the wiretapping was well underway.

The illegal eavesdropping started long before Steele’s dossier. Federal sources said the wiretaps on Trump insiders began in late 2015, almost a year before the 2016 election. The targets then were Flynn and Page, sources confirmed. When no smoking gun was recovered from those initial taps, U.S. intelligence agencies moved to broaden the scope through their newly-formed alliance.

Intelligence garnered from the British eavesdropping, which again was merely a front for the NSA, was then used in August 2016 to secure a legitimate FISA warrant on Manafort, Trump Jr. and Kushner. That warrant was issued on or about September, 2016, federal sources confirm.

It was the third time the cabal of U.S. intelligence agencies sought a FISA warrant for the Trump associates and this time it was approved.

FBI sources said finally obtaining the FISA warrant was important because it provided the agencies cover for previous illegal wiretapping which they believed would never be discovered.

This would make for an incredible string of Senate hearings,” one federal law enforcement source said. “I don’t think they ever thought he (Trump) would win and information would come out about how they manipulated evidence.”



Friday, 26 September 2014

Glenn Greenwald reveals secret GCHQ plan

As usual, Glenn Greenwald's journalism is immaculate.
This important information has to be linked with recent events in both Australia and New Zealand and illustrates moves to rapidly take away democratic rights to criticise in both countries

HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS
Glenn Greenwald


25 September, 2014



One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series ofarticles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based onfour classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:
Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:
Then there are the tactics used to destroy companies the agency targets:
GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.
The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”
Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.
Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?
Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”
Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:


The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?
As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”
These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
Documents referenced in this article:

Tuesday, 19 August 2014

Spying on the world

Masters of the Internet: GCHQ scanned entire countries for vulnerabilities
GCHQ is scanning servers in multiple foreign countries for vulnerable ports, according to German newspaper Heise. Using a tool called Hacienda, the intelligence agency seeks to ‘master the internet’ for sources of espionage


18 August, 2014


.

Spanish for estate, Hacienda can port scan all of the servers in a country to provide information on user endpoints and scan for potential vulnerabilities. The ability to port scan is not new, but the scale of its use by government spies, with 27 countries scanned by 2009, has shocked many familiar with the software.

In 2009, the British spy agency GCHQ made port scans a 'standard tool' to be applied against entire nations,” Heise reports. “Twenty-seven countries are listed as targets of the Hacienda [program].”

The process of scanning entire countries and looking for vulnerable network infrastructure to exploit is consistent with the meta-goal of "Mastering the Internet", which is also the name of a GCHQ cable-tapping program. Targeted protocols include SSH, HTTP and FTP, among others.

Systems may be attacked simply because they might eventually create a path towards a valuable espionage target, even without indications this will ever be the case. Based on this logic, every device is a target.

The database resulting from the scans is shared with other spy agencies in the UK, US, Canada, Australia and New Zealand. MAILORDER is described in the documents as a secure transport protocol used between the ‘Five Eyes’ spy agencies to exchange collected data.

System and network administrators face the threat of industrial espionage, sabotage and human rights violations created by nation states indiscriminately attacking network infrastructure and breaking into services.

GCHQ says it will not comment on “intelligence matters” but reiterates that everything that it does is done within a strict legal framework. “It is a longstanding policy that we do not comment on intelligence matters,” a GCHQ spokesperson told The Inquirer.

All of GCHQ's work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception of Communications and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee.

All our operational processes rigorously support this position,” they added.

British intelligence is permitted to go further in surveillance than similar agencies in other Western countries, according to Edward Snowden. The former NSA contractor believes the powers of the British intelligence establishment are not restricted effectively enough by “law or policy”. The lack of legal restrictions allows UK intelligence services to target more people than is necessary.


Thursday, 22 May 2014

A bizarre day


It has been the strangest of days today.
My computer has been acting up for some time. I would start the day with everything working OK, but after some time everything would stall and the only way I could continue was to restart the computer.
It was worse than ever this morning and after doing a couple of items the internet went off line and I was unable to do anything.  This was part of a day when I FELT harassed because nothing was working  for me.
I took my computer along to a "whizz" along the road. He plugged into their broadband and the computer was faster than it has been for many weeks, despite the fact they are not on super-fast broadband like me.
I brought everything back home: the internet was back up and the computer was working at full speed, despite having done nothing except disconnect and reconnect to the Wi-Fi.
I am left wondering whether to pay my $200 to break my agreement with Vodophone and hook up with another NZ-owned, non-corporate one (endorsed by none other than Kim Dotcom).
It could all be down to a faulty connection - but I am not a great believer in the theory of endless coincidence.
This is not the first time I've had something interesting happen with my provider, Vodophone. See HERE.
In the meantime here is an article about Vodophone who recently bought Telstra CLEAR (which itself had bought out the NZ-owned CLEAR).  It turns out that our corporate friends are great friends with GCHQ and the NSA (and presumably with the GCSB here in NZ as well)

BT and Vodafone among telecoms companies passing details to GCHQ
Fears of customer backlash over breach of privacy as firms give GCHQ unlimited access to their undersea cables


2 August, 2013


Some of the world's leading telecoms firms, including BT and Vodafone, are secretly collaborating with Britain's spy agency GCHQ, and are passing on details of their customers' phone calls, email messages and Facebook entries, documents leaked by the whistleblower Edward Snowden show.

BT, Vodafone Cable, and the American firm Verizon Business – together with four other smaller providers – have given GCHQ secret unlimited access to their network of undersea cables. The cables carry much of the world's phone calls and internet traffic.

In June the Guardian revealed details of GCHQ's ambitious data-hoovering programmes, Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. It emerged GCHQ was able to tap into fibre-optic cables and store huge volumes of data for up to 30 days. That operation, codenamed Tempora, has been running for 20 months.

On Friday Germany's Süddeutsche newspaper published the most highly sensitive aspect of this operation – the names of the commercial companies working secretly with GCHQ, and giving the agency access to their customers' private communications. The paper said it had seen a copy of an internal GCHQ powerpoint presentation from 2009 discussing Tempora.

The document identified for the first time which telecoms companies are working with GCHQ's "special source" team. It gives top secret codenames for each firm, with BT ("Remedy"), Verizon Business ("Dacron"), and Vodafone Cable ("Gerontic"). The other firms include Global Crossing ("Pinnage"), Level 3 ("Little"), Viatel ("Vitreous") and Interoute ("Streetcar"). The companies refused to comment on any specifics relating to Tempora, but several noted they were obliged to comply with UK and EU law.

The revelations are likely to dismay GCHQ and Downing Street, who are fearful that BT and the other firms will suffer a backlash from customers furious that their private data and intimate emails have been secretly passed to a government spy agency. In June a source with knowledge of intelligence said the companies had no choice but to co-operate in this operation. They are forbidden from revealing the existence of warrants compelling them to allow GCHQ access to the cables.

Together, these seven companies operate a huge share of the high-capacity undersea fibre-optic cables that make up the backbone of the internet's architecture. GCHQ's mass tapping operation has been built up over the past five years by attaching intercept probes to the transatlantic cables where they land on British shores. GCHQ's station in Bude, north Cornwall, plays a role. The cables carry data to western Europe from telephone exchanges and internet servers in north America. This allows GCHQ and NSA analysts to search vast amounts of data on the activity of millions of internet users. Metadata – the sites users visit, whom they email, and similar information – is stored for up to 30 days, while the content of communications is typically stored for three days.

GCHQ has the ability to tap cables carrying both internet data and phone calls. By last year GCHQ was handling 600m "telephone events" each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.

Each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.

This operation is carried out under clandestine agreements with the seven companies, described in one document as "intercept partners". The companies are paid for logistical and technical assistance.

The identity of the companies allowing GCHQ to tap their cables was regarded as extremely sensitive within the agency. Though the Tempora programme itself was classified as top secret, the identities of the cable companies was even more secret, referred to as "exceptionally controlled information", with the company names replaced with the codewords, such as "GERONTIC", "REMEDY" and "PINNAGE".

However, some documents made it clear which codenames referred to which companies. GCHQ also assigned the firms "sensitive relationship teams". One document warns that if the names emerged it could cause "high-level political fallout".

Germans have been enraged by the revelations of spying by the National Security Agency and GCHQ after it emerged that both agencies were hoovering up German data as well. On Friday the Süddeutsche said it was now clear that private telecoms firms were far more deeply complicit in US-UK spying activities than had been previously thought.

The source familiar with intelligence maintained in June that GCHQ was "not looking at every piece of straw" but was sifting a "vast haystack of data" for what he called "needles".

He added: "If you had the impression we are reading millions of emails, we are not. There is no intention in this whole programme to use it for looking at UK domestic traffic – British people talking to each other." The source said analysts used four criteria for determining what was examined: security, terror, organised crime and Britain's economic wellbeing."The vast majority of the data is discarded without being looked at … we simply don't have the resources."

Nonetheless, the agency repeatedly referred to plans to expand this collection ability still further in the future.

Once it is collected, analysts are able to search the information for emails, online chats and browsing histories using an interface called XKeyscore, uncovered in the Guardian on Wednesday. By May 2012, 300 analysts from GCHQ and 250 NSA analysts had direct access to search and sift through the data collected under the Tempora program.

Documents seen by the Guardian suggest some telecoms companies allowed GCHQ to access cables which they did not themselves own or operate, but only operated a landing station for. Such practices could raise alarm among other cable providers who do not co-operate with GCHQ programmes that their facilities are being used by the intelligence agency.

Telecoms providers can be compelled to co-operate with requests from the government, relayed through ministers, under the 1984 Telecommunications Act, but privacy advocates have raised concerns that the firms are not doing enough to challenge orders enabling large-scale surveillance, or are co-operating to a degree beyond that required by law.

"We urgently need clarity on how close the relationship is between companies assisting with intelligence gathering and government," said Eric King, head of research for Privacy International. "Were the companies strong-armed, or are they voluntary intercept partners?"

Vodafone said it complied with the laws of all the countries in which its cables operate. "Media reports on these matters have demonstrated a misunderstanding of the basic facts of European, German and UK legislation and of the legal obligations set out within every telecommunications operator's licence … Vodafone complies with the law in all of our countries of operation," said a spokesman.

"Vodafone does not disclose any customer data in any jurisdiction unless legally required to do so. Questions related to national security are a matter for governments not telecommunications operators."

A spokeswoman for Interoute said: "As with all communication providers in Europe we are required to comply with European and local laws including those on data protection and retention. From time to time we are presented with requests from authorities. When we receive such requests, they are processed by our legal and security teams and if valid, acted upon."

A spokeswoman for Verizon said: "Verizon continually takes steps to safeguard our customers' privacy. Verizon also complies with the law in every country in which we operate."

BT declined to comment.