From Wikipedia, the free encyclopedia

Dishfire (stylised DISHFIRE) is a covert global surveillance collection system and database run by the United States of America's National Security Agency (NSA) and the United Kingdom's Government Communications Headquarters (GCHQ) that collects hundreds of millions of text messages on a daily basis from around the world.[1] A related analytic tool is known as Prefer.


The database is operated by the following agencies:

The existence of the database was revealed in 2014 based on documents disclosed by whistleblower Edward Snowden.[3] According to Snowden's documents, Britain's Government Communications Headquarters (GCHQ) has been given full access to the Dishfire database, which the agency uses to obtain personal information of Britons by exploiting a legal loophole.[2]

Scope of surveillance[edit]

Each day, Dishfire collects the following amounts of data:

The press highlighted some quotes from the internal presentations highlighting the intent of this operation: one leaked GCHQ document said that DISHFIRE “collects pretty much everything it can, so you can see SMS from a selector which is not targeted.” The bulk collection was therefore suggested in this document as “particularly useful for the development of new targets, since it is possible to examine the content of messages sent months or even years before the target was known to be of interest.”[1] (emphasis in original)

In response, a spokeswoman of the NSA describes the database as follows: "Dishfire is a system that processes and stores lawfully collected SMS data. Because some SMS data of US persons may at times be incidentally collected in NSA’s lawful foreign intelligence mission, privacy protections for US persons exist across the entire process concerning the use, handling, retention and dissemination of SMS data in Dishfire."[1]

Data processing[edit]

Dishfire is typically exploited with an analytical tool known as the Prefer program (stylised PREFER), which processes SMS messages to extract information including contacts from missed call alerts, location from roaming and travel alerts, financial information from bank alerts and payments, and names from electronic business cards.[1]


A Vodafone representative declared in the breaking news story on Channel 4 that “It’s the first we’ve heard about it and naturally we’re shocked and surprised.” He went on to say that Dishfire was probably circumventing UK law.[1] According to Channel 4's Geoff White, "the Dishfire system gives GCHQ a legal loophole to get such information without needing a RIPA request. That's because the text messages are gathered and stored by the NSA – and GCHQ's access to foreign intelligence agencies' stash of data is not covered by any UK law."[2] Former UK Interception Commissioner Sir Swinton Thomas drew an analogy between this method of circumventing the UK interception laws and torture in a foreign country, adding that it was a “different area of course, but the concept is very similar”.[4]


See also[edit]


  1. ^ a b c d e f g h i j James Ball (2014-01-16). "NSA collects millions of text messages daily in 'untargeted' global sweep". The Guardian. Archived from the original on 2014-03-24. Retrieved 2014-03-23.
  2. ^ a b c d Geoff White (2014-01-17). "Revealed: UK and US spied on text messages of Brits". Channel4. Archived from the original on 2014-03-27. Retrieved 2014-03-23.
  3. ^ a b Mark Mardell (2014-01-17). "Report: NSA 'collected 200m texts per day'". British Broadcasting Corporation. Archived from the original on 2014-03-30. Retrieved 2014-03-23.
  4. ^ Ian Johnston (2014-01-16). "NSA leaks: British spies were given access to US 'Dishfire' system that reads hundreds of millions of texts from around the world". The Independent. Archived from the original on 2014-02-23. Retrieved 2014-03-23.