|  | <<  
             ^ 
              >> 
            
              | Date: 1998-08-14 
 
 ECHELON: Experten evaluieren Welt/Abhoersystem-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 
 Von Wayne Madsen, Co-Autor des NSA Standardwerks "The Puzzle
 Palace" bis Nicky Hager, der für die letzten Enthüllungen
 über das Weben & Wirken des Abhör/systems ECHELON , kommen
 in diesem Artikel der Village Voice so ziemlich alle
 Durch/blicker zu Wort.
 
 Prädikat: Must read
 
 
 -.-.- --.-  -.-.- --.-  -.-.- --.-
 
 Listening In: The U.S.-led ECHELON Spy Network is
 Eavesdropping on the Whole World
 
 By Jason Vest
 
 Suppose, this past weekend, you sent an e-mail to a friend
 overseas. There's a reasonable possibility your
 communication was intercepted by a global surveillance
 system--especially if you happened to discuss last week's
 bombings in East Africa. Or suppose you're stuck in traffic
 and in your road rage you whip out a cell phone and angrily
 call your congressman's office in Washington. There's a
 chance the government is listening in on that conversation,
 too (but only for the purposes of "training" new
 eavesdroppers).
 
 Or suppose you're on a foreign trip--vacation, business,
 relief work--and you send off a fax to some folks that
 Washington doesn't view too keenly. Your message could be
 taken down and analyzed by the very same system.
 
 That system is called ECHELON and it is controlled by the
 U.S. National Security Agency (NSA). In America, it is the
 Intelligence Network That Dare Not Be Acknowledged.
 Questions about it at Defense Department briefings are
 deftly deflected. Requests for information about it under
 the Freedom of Information Act linger in bureaucratic limbo.
 Researchers who mention possible uses of it in the presence
 of intelligence officials are castigated. Members of
 Congress--theoretically, the people's representatives who
 provide oversight of the intelligence community--betray no
 interest in helping anyone find out anything about it. Media
 outlets (save the award-winning but low-circulation Covert
 Action Quarterly) ignore it. In the official view of the
 U.S. Government, it doesn't exist.
 
 But according to current and former intelligence officials,
 espionage scholars, Australian and British investigative
 reporters, and a dogged New Zealand researcher, it is all
 too real. Indeed, a soon-to-be finalized European Parliament
 report on ECHELON has created quite a stir on the other side
 of the Atlantic. The report's revelations are so serious
 that it strongly recommends an intensive investigation of
 NSA operations.
 
 The facts drawn out by these sources reveal ECHELON as a
 powerful electronic net--a net that snags from the millions
 of phone, fax, and modem signals traversing the globe at any
 moment selected communications of interest to a five-nation
 intelligence alliance. Once intercepted (based on the use of
 key words in exchanges), those communiqués are sent in real
 time to a central computer system run by the NSA;
 round-the-clock shifts of American, British, Australian,
 Canadian, and New Zealand analysts pour over them in search
 of . . . what?
 
 Originally a Cold War tool aimed at the Soviets, ECHELON has
 been redirected at civilian targetsworldwide. In fact, as
 the European Parliament report noted, political advocacy
 groups like Amnesty International and Greenpeace were
 amongst ECHELON's targets. The system's awesome potential
 (and potential for abuse) has spurred some traditional
 watchdogs to delve deep in search of its secrets, and even
 prompted some of its minders within the intelligence
 community to come forward. "In some ways," says Reg
 Whittaker, a professor and intelligence scholar at Canada's
 York University, "it's probably the most useful means of
 getting at the Cold War intelligence-sharing relationship
 that still continues."
 
 While the Central Intelligence Agency--responsible for
 covert operations and human-gathered intelligence, or
 HUMINT--is the spy agency most people think of, the NSA is,
 in many respects, the more powerful and important of the
 U.S. intelligence organizations. Though its most egregious
 excesses of 20 years ago are believed to have been curbed,
 in addition to monitoring all foreign communications, it
 still has the legal authority to intercept any communication
 that begins or ends in the U.S., as well as use American
 citizens' private communications as fodder for trainee
 spies. Charged with the gathering of signals intelligence,
 or SIGINT--which encompasses all electronic communications
 transmissions--the NSA is larger, better funded, and
 infinitely more secretive than the CIA. Indeed, the key
 document that articulates its international role has never
 seen the light of day.
 
 That document, known as the UKUSA Agreement, forged an
 alliance in 1948 among five countries--the U.S., Britain,
 Australia, Canada, and New Zealand--to geographically divvy
 up SIGINT-gathering responsibilities, with the U.S. as
 director and main underwriter. Like the NSA--hardly known
 until the Pike and Church congressional investigations of
 the '70s--the other four countries' SIGINT agencies remain
 largely unknown and practically free of public oversight.
 While other member nations conduct their own operations,
 there has "never been any misunderstanding that we're NSA
 subsidiaries," according to Mike Frost, an ex-officer in
 Canada's SIGINT service, the Communications Security
 Establishment (CSE). Moreover, all the signatory countries
 have NSA listening posts within their borders that operate
 with little or no input from the local agency.
 
 Like nature, however, journalism abhors a vacuum, and the
 dearth of easily accessible data has inspired a cadre of
 researchers around the world to monitor the SIGINT community
 as zealously as possible. It is not, says David Banisar of
 the Electronic Privacy Information Center (EPIC), an easy
 task. Getting raw data is difficult enough. Figuring out
 what it means even more so, he says, thanks in part to the
 otherwise conservative NSA's very liberal use of code
 names--many of which regularly change--for everything from
 devices to operations. One that appears to have remained
 constant, however, is ECHELON.
 
 In 1988, Margaret Newsham, a contract employee from Lockheed
 posted at Menwith Hill, the NSA's enormous listening post in
 Yorkshire, England, filed a whistleblower suit against
 Lockheed, charging the company with waste and mismanagement
 (the case is currently being appealed after an initial
 dismissal). At the same time, Newsham told Congressional
 investigators that she had knowledge of illegal
 eavesdropping on American citizens by NSA personnel. While a
 committee began investigating, it never released a report.
 Nonetheless, British investigative reporter Duncan Campbell
 managed to get hold of some of the committee's findings,
 including a slew of Menwith Hill operations. Among them was
 a project described as the latest installment of a system
 code named ECHELON that would enable the five SIGINT
 agencies "to monitor and analyze civilian communications
 into the 21st century."
 
 To SIGINT watchers, the concept wasn't unfamiliar. In the
 early '80s, while working on his celebrated study of the
 NSA, The Puzzle Palace, James Bamford discovered that the
 agency was developing a system called PLATFORM, which would
 integrate at least 52 separate SIGINT agency computer
 systems into one central network run out of Fort Meade,
 Maryland. Then in 1991, an anonymous British SIGINT officer
 told the TV media about an ongoing operation that
 intercepted civilian telexes and ran them through computers
 loaded with a program called "the Dictionary"--a description
 that jibed with both Bamford and Campbell's gleanings.
 
 In 1996, however, intelligence watchdogs and scholars got an
 avalanche of answers about ECHELON, upon the publication of
 Secret Power: New Zealand's Role in the International Spy
 Network,written by Nicky Hager. A New Zealand activist
 turned investigative author, Hager spent 12 years digging
 into the ties between his country's SIGINT agency, the
 Government Communications Security Bureau (GCSB), and the
 NSA. Utilizing leaked material and scores of interviews with
 GCSB officers, Hager not only presented a revealing look at
 the previously unknown machinations of the GCSB (even New
 Zealand's Prime Minister was kept in the dark about its full
 scope) but also produced a highly detailed description of
 ECHELON.
 
 According to Hager's information--which leading SIGINT
 scholar and National Security Archive analyst Jeffrey
 Richelson calls "excellent"--ECHELON functions as a
 real-time intercept and processing operation geared toward
 civilian communications. Its first component targets
 international phone company telecommunications satellites
 (or Intelsats) from a series of five ground intercept
 stations located at Yakima, Washington; Sugar Grove, West
 Virginia; Morwenstow in Cornwall, England; Waihopai, New
 Zealand; and Geraldton, Australia.
 
 The next component targets other civilian communications
 satellites, from a similar array of bases, while the final
 group of facilities intercept international communications
 as they're relayed from undersea cables to microwave
 transmitters. According to Hager's sources, each country
 devises categories of intercept interest. Then a list of key
 words or phrases (anything from personal, business, and
 organization names to e-mail addresses to phone and fax
 numbers) is devised for each category. The categories and
 keywords are entered by each country into its "Dictionary"
 computer, which, after recognizing keywords, intercepts full
 transmissions, and sends them to the terminals of analysts
 in each of the UKUSA countries.
 
 To the layperson, ECHELON may sound like something out of
 the X-Files. But the National Security Archives's Richelson
 and others maintain that not only is this not the stuff of
 science fiction, but is, in some respects, old hat. More
 than 20 years ago, then CIA director William Colby
 matter-of-factly told congressional investigators that the
 NSA monitored every overseas call made from the United
 States. Two years ago, British Telecom accidentally
 disclosed in a court case that it had provided the Menwith
 Hill station with equipment potentially allowing it access
 to hundreds of thousands of European calls a day. "Let me
 put it this way," says a former NSA officer. "Consider that
 anyone can type a keyword into a Net search engine and get
 back tens of thousands of hits in a few seconds." A pause.
 "Assume that people working on the outer edges have
 capabilities far in excess of what you do."
 
 Since earlier this year, ECHELON has caused something of a
 panic in Europe, following the disclosure of an official
 European Parliament report entitled "In Appraisal of
 Technologies of Political Control." While the report did
 draw needed attention to ECHELON, it--and subsequent
 European press coverage--says Richelson, "built ECHELON up
 into some super-elaborate system that can listen in on
 everyone at any time, which goes beyond what Nicky Hager
 wrote." Richelson, along with other SIGINT experts,
 emphasizes that, despite ECHELON's apparent considerable
 capabilities, it isn't omniscient.
 
 EPIC's David Banisar points out that despite the high volume
 of communications signals relayed by satellite and
 microwave, a great many fiber-optic communications--both
 local and domestic long distance--can't be intercepted
 without a direct wiretap. And, adds Canadian ex-spook Mike
 Frost, there's a real problem sorting and reading all the
 data; while ECHELON can potentially intercept millions of
 communications, there simply aren't enough analysts to sort
 through everything. "Personally, I'm not losing any sleep
 over this," says Richelson, "because most of the stuff
 probably sits stored and unused at [NSA headquarters in]
 Fort Meade."
 
 Richelson's position is echoed by some in the intelligence
 business ("Sure, there's potential for abuse," says one
 insider, "but who would you rather have this--us or Saddam
 Hussein?"). But others don't take such a benign view.
 "ECHELON has a huge potential for violating privacy and for
 abuses of democracy," says Hager. "Because it's so powerful
 and its operations are so secret that there are no real
 constraints on agencies using it against any target the
 government chooses. The excessive secrecy built up in the
 Cold War removes any threat of accountability."
 
 The only time the public gets anything resembling oversight,
 Hager contends, is when intelligence officials have a crisis
 of conscience, as several British spooks did in 1992. In a
 statement to the London Observer, the spies said they felt
 they could "no longer remain silent regarding that which we
 regard to be gross malpractice and negligence within the
 establishment we operate"--the establishment in question
 being the Government Communications Headquarters (GCHQ),
 Britain's version of the NSA. The operatives said that an
 intercept system based on keyword recognition (sound
 familiar?) was routinely targeting the communications of
 Amnesty International and Christian Aid.
 
 Adds Hager, "The use of intelligence services in these cases
 had nothing to do with national security, but everything to
 do with keeping tabs on critics. The British government
 frequently finds itself in political conflict with Amnesty
 over countries it is supplying arms to or governments with
 bad human rights records. ECHELON provides the government
 with a way to gain advantage over Amnesty by eavesdropping
 on their operations."
 
 Hager and others also argue that potential for abuse lies in
 the hierarchical and reciprocal nature of the UKUSA
 alliance. According to data gathered by congressional
 committees in the '70s, and accounts of former SIGINT
 officers like Frost, UKUSA partners have, from time to time,
 used each other to circumvent prohibitions on spying on
 their own citizens. Frost, for example, directed Canadian
 eavesdropping operations against both Americans and
 Britons--at the request of both countries' intelligence
 services, to whom the surveillance data was subsequently
 passed.
 
 And British Members of Parliament have raised concerns for
 years about the lack of oversight at the NSA's Menwith Hill
 facility--a base on British soil with access to British
 communications yet run by the NSA, which works closely with
 the GCHQ. "Given that both the U.S. and Britain turn their
 electronic spying systems against many other friendly and
 allied nations," says Hager, "the British would be naive not
 to assume it is happening to them."
 
 David Banisar, the electronic privacy advocate, says that
 apparently just asking about ECHELON, or mentioning anything
 like it, is considered unreasonable. Since earlier this
 year, Banisar has been trying to get information on ECHELON
 from the NSA under the Freedom of Information Act. "They're
 not exactly forthcoming," he says, explaining that he only
 recently got a response in which he was in effect told the
 European Parliament report "didn't provide enough
 information" for the NSA to locate the requested
 information. However, Wayne Madsen, co-author with Bamford
 of the most recent edition of The Puzzle Palace, was more
 directly discouraged from investigating ECHELON's possibly
 dubious applications, as the following story makes clear.
 
 On April 21, 1996, Chechnyen rebel leader Dzokhar Dudayev
 was killed when a Russian fighter fired two missiles into
 his headquarters. At the time of the attack, Dudayev had
 been talking on his cellular phone to Russian officials in
 Moscow about possible peace negotiations. According to
 electronics experts, getting a lock on Dudayev's cell phone
 signal would not have been difficult, but as Martin
 Streetly, editor of Jane's Radar and Electronic Warfare
 Systems, noted at the time, the Russian military was so
 under-equipped and poorly maintained, it was doubtful a
 radar intercept plane could have honed in on the signal
 without help.
 
 Speaking at a conference on Information Warfare a month
 later, Madsen, one of the world's leading SIGINT and
 computer security experts, explained that it was both
 politically and technically possible that the NSA helped the
 Russians kill Dudayev. Noting the West's interest in
 preserving the Yeltsin presidency and in ensuring the safety
 of an oil consortium's pipeline running through Chechnya,
 Madsen explained which NSA satellites could have been used
 to intercept Dudayev's call and directionally locate its
 signal.
 
 This wasn't exactly a stunning revelation: Not only had
 reports recently been released in Australia and Switzerland
 about police tracking suspects by their cell phone
 signatures, but Reuters and Agence France-Press had written
 about the Dudayev scenario as technically plausible. Still,
 after his talk, Madsen was approached by an Air Force
 officer assigned to the NSA, who tore into him. "Don't you
 realize that we have people on the ground over there?"
 Madsen recalled the officer seething. "You're talking about
 things that could put them in harm's way." Asks Madsen, "If
 this was how Dudayev died, do you think it's unreasonable
 the American people know about the technical aspects behind
 this kind of diplomacy?"
 ...
 
 full text
 http://www.villagevoice.com/ink/news/33vest.shtml
 
 relayed by Macmaniac Grinner
 http://www.gis.at
 
 -.-.- --.-  -.-.- --.-  -.-.- --.-
 TIP
 Download free PGP 5.5.3i (Win95/NT & Mac)
 http://keyserver.ad.or.at/pgp/download/
 
 -.-.- --.-  -.-.- --.-  -.-.- --.-
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 edited by
 published on: 1998-08-14
 comments to office@quintessenz.at
 subscribe Newsletter
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 <<  
                   ^ 
                    >>
 |  |  |  |