GCHQ is promoting a programme in dozens of primary and secondary schools where children are being taught how to launch a “cyber attack” against “a large school or university”, how to hack passwords and “vulnerable machines”, and how to spy on other children’s wifi traffic.
The programme, known as the Cyber Schools Hub or CyberFirst, is operated in partnership with Cyber Security Associates (CSA) – a company set up by former members of the Ministry of Defence (MOD)’s Joint Cyber Offensive Unit, which is housed at GCHQ headquarters in Cheltenham, southwest England.
Documents seen by Declassified suggest that CSA has worked closely with GCHQ to design the schools programme from the beginning, and that GCHQ is using taxpayers’ money to pay the company to develop “cyber security” products.
CSA has also hosted dozens of children at its offices as part of a work experience programme. It is not known if parents are told that the company is run by former government cyber warfare specialists.
The sensitive nature of the skills children are being taught is illustrated by a disclaimer in CSA material which states: “The misuse of the information in this document can result in criminal charges brought against the persons in question.”
CSA was established by David Woodfine, a former commander of the Joint Cyber Offensive Unit, the month following his departure from the MOD. His co-director, James Griffiths, was an “operator providing cyber offensive capability” in the same unit.
The unit’s existence appears to have only ever been recognised in online biographies of Woodfine and Griffiths and it is not known what operations it has been involved in.
Declassified has also seen evidence that CSA has been provided with equipment by GCHQ to incentivise it to go into the schools, to “help develop activities based on the roles within a Security Operations Centre”, which is another cyber unit in the MOD that Woodfine commanded for a number of years.
/file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-1.jpg)
CSA was incorporated as a company in April 2016, the month before GCHQ’s schools programme was launched. Woodfine and Griffiths have established eight variants of CSA, with slightly different names, since 2013.
GCHQ runs the Cyber Schools Hub (CSH) programme through one of its arms, the National Cyber Security Centre (NCSC), which opened in 2016.
The NCSC and CSA did not respond to questions about whether CSA was set up with GCHQ’s blessing to help run its schools programme.
“Training school students into the murky world of cyber warfare under the guise of improving their aspirations is immoral, dangerous and deeply worrying,” said Emma Sangster, coordinator of ForcesWatch, an organisation set up to track the militarisation of British society.
“The creep of the security state into schools is not receiving the public scrutiny it deserves. Not only is the understandable interest of children and teenagers in this area being exploited for the benefit of under-the-radar interests, but facilitating activities such as hacking puts young people at risk by encouraging potentially illegal activity.”
Sangster added: “We hope that parents and school governors will look carefully at the duty of care implications and challenge the involvement of their schools with the state's security forces.”
Declassified has revealed that the CSH programme is promoting arms corporations involved in war crimes overseas to British school children. It has also been revealed that GCHQ officers themselves are operating in at least one school, while parents of pupils at schools across the programme do not appear to have been informed about the extent of the spy agency’s role in it.
GCHQ divulges little information about the schools programme and did not respond to queries for this article, but Declassified has seen a newsletter produced for a short period from December 2018 to July 2019, which gives some details.
Online covert action
The UK government has a National Offensive Cyber Programme, run jointly by the MOD and GCHQ, which has a budget of £250-million and 2,000 staff.
Disclosures from US whistleblower Edward Snowden in 2013 revealed that GCHQ has a secret cyber warfare unit, named the Joint Threat Research Intelligence Group (JTRIG), which takes five percent of the organisation’s budget. Its stated purpose is to “destroy, deny, degrade, disrupt” enemies by “discrediting” them, and its operations include “honey traps”, “false flags” (posing as an enemy) or “writing a blog purporting to be one of their victims”.
According to Richard J Aldrich, a professor at Warwick University in central England and author of the authoritative history of GCHQ, “One of the enemies on JTRIG’s list is investigative journalists who pose a ‘potential threat to security’”.
JTRIG also undertook a “pioneering effects operation”– or cyber warfare programme – against Argentina, a friendly country with whom the UK is not engaged in hostilities. Documents released from the Snowden archive do not cover the Joint Cyber Offensive Unit (JCOU), whose activities are likely to be just as sensitive.
/file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-2.jpg)
Before running JCOU, Woodfine was commanding officer of the Security Operations Centre at the MOD base at Corsham in Wiltshire, which is the centre of the UK’s cyber warfare activities.
His partner, James Griffiths, who worked at GCHQ on cyber warfare for five years, was previously in the British Army and “specialised in information systems”, being deployed at home and overseas, and “often working with special forces in hostile environments”. It is possible Griffiths was deployed in one of the seven covert wars being fought by Britain’s special forces in places like Syria and Libya.
Last year, the British parliament’s oversight body, the Intelligence and Security Committee, found evidence that GCHQ had played a role in supporting the CIA’s post-9/11 kidnap and torture programme.
The committee unearthed examples of GCHQ’s intelligence being used to locate and detain terrorism suspects who were subsequently rendered and tortured, as well as providing intelligence to assist the interrogation of terrorism suspects held at CIA “black sites”.
CSA and GCHQ
According to documents seen by Declassified, CSA has worked closely with GCHQ to design the Cyber Schools Hub programme – which was set up in 2017 – from the beginning. A staffer from CSA, identified only as Madeline, created and ran the now-defunct @CyberSchoolsHub twitter handle which GCHQ used to promote the project.
Months later, the same Madeline “spent a day every week with the NCSC team”. She was entrusted with several tasks by GCHQ “including overhauling the CSH informal website and correlating and coordinating industry support requirements from schools”. Madeline was also given an @cyberhub.uk email address.
It is assumed the Madeline referred to in the documents is Madeline Howard who was previously Business Development Manager at CSA, during which time she gave talks in schools involved in GCHQ’s programme. The then 21-year-old Howard began working for CSA soon after it was incorporated, helping to publicly
style="font-weight: 400;">promote the company.
She is now director of CyNam – “a Cheltenham-centric platform that connects the best cyber security minds and local [businesses] and start-ups” – which is closely linked to CSA.
Howard is emblazoned on the frontpage of a new magazine, produced by Cheltenham Borough Council, promoting the council’s Golden Valley development, which will include a £400-million “cyber campus” on a 200-hectare site next door to GCHQ.
In her article, Howard writes extensively of GCHQ’s schools programme, saying that it “seeks to give young students the space and the opportunity to excel and explode into the market of cyber security and innovation”.
/file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-3.jpg)
When a steering group made up of representatives from companies involved in the project was created to develop industry engagement further, Madeline was GCHQ’s point of contact “if you or your company would like to be involved in this group”. At the Cheltenham Science Festival, attended by school students, GCHQ sponsored the Cyber Zone area and included a CSA exhibit.
GCHQ, meanwhile, has facilitated the entry of both CSA’s co-founders, Woodfine and Griffiths, into schools in Gloucestershire to work with children.
The CSA website has three pages on its “About” section, one of which is dedicated to the Cyber Schools Hub. The company is one of only two “partners” in the programme and is an “approved school supplier'' which allows it to provide cyber projects and vocational courses for schools “across the UK”. In 2019, the company had 11 staff.
David Woodfine told Declassified in March 2019 that CSA has contracts with GCHQ and that it also offers “a range of cyber managed services to the commercial market”. It is not known if parents of children involved in the CSH project have been made aware of CSA’s connections to GCHQ.
Cyber warfare and hacking for kids
In early 2019, CSA launched its flagship educational product, named the Cyberdea Immersive Zone. Built on the bottom floor of the CSA offices in Quedgeley, a small town south-west of Gloucester, Cyberdea is a specialised cyber training facility primarily for use by school students. Able to host up to 24 children at a time, the facility offers a range of courses for all abilities.
One seven-hour course for basic to intermediate level – which runs for school hours of 9am to 4pm – is titled “cyber offensive session”. The promotional blurb says that the class will “fully immerse the students into the mindset of a cyber attacker where they will be taken through the reconnaissance, analysis, penetration and exploitation phases of a cyber attack”.
It adds, “Using our simulated and virtualised environment, a number of realistic networks and scenarios will be available to attack. These range from a small business network to a large school or university network.”
According to documents seen by Declassified, from February to March 2019, seven Gloucestershire schools booked to bring their students to Cyberdea for training. It is not known if these included primary schools.
The NCSC says that having the Cyberdea facility close to the schools in the programme helped, because after trips to Bletchley Park and the Bank of England, “the project teachers informed us that these... required a lot of paperwork overhead”. Lighter paperwork was apparently needed to send children to Cyberdea.
It is unclear if Cyberdea was created by CSA on a contract from GCHQ. The Cyber Schools Hub logo appears prominently on the Cyberdea website.
/file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-4.jpg)
The second major project CSA has devised for GCHQ’s schools programme is called Cyber Pi, a series of boxes containing projects on small single-board computers that introduce children to programming and hacking.
A screenshot of a hacking lesson produced for British school children by a company founded by veterans of GCHQ’s cyber warfare unit. /file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-5.jpg)
/file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-6.jpg)
/file/dailymaverick/wp-content/uploads/declassified-britschool3-inset-7.jpg)