Part 1: Massive Domestic Spying via NSA ECHELON
---- - ------- -------- ------ --- --- -------
o The NSA Admits
o Secret Court
o Wild Conspiracy Theory
o Over the Top
o BAM-BAM-BAM
o Australian ECHELON Spotted
o New Zealand: Unhappy Campers
People are correct in being paranoid of the
U.S. government being totally out of control.
The NSA/FBI even have a locked secret court located within the main
Justice Department building that only government employees can visit.
It has never turned down a request, and doesn’t even need suspicion
of a crime to authorize a “black-bag job” burglary.
Question: Then why bother?
Answer: To give the illegal activity the imprimatur of constitutionality.
And presidents issue secret directives that obliterate constitutional rights.
Like the creation of the NSA.
NSA testimony to Congress: “There is no law that prevents our domestic spying”.
Such is the unconstitutional power of the Presidential Magic Order.
It is even threatened to be used to wipe out Congressional legislation:
: However, President Clinton has threatened to veto ProCode.
: If Congress over-rides a VETO President Clinton signed an
: executive order (11/15/96) which states he can revoke any law
: passed on national security grounds:
:
: “Upon enactment of any legislation reauthorizing the
: administration of export controls, the Secretary of Defense,
: the Secretary of State, and the Attorney General shall
: reexamine whether adequate controls on encryption products can
: be maintained under the provisions of the new statute and
: advise the Secretary of Commerce of their conclusions as well
: as any recommendations for action. If adequate controls on
: encryption products cannot be maintained under a new statute,
: then such products shall, where consistent with law, be
: designated or redesignated as defense articles under 22 U.S.C.
: 2778(a)(1), to be placed on the United States Munitions List
: and controlled pursuant to the terms of the Arms Export
: Control Act and the International Traffic in Arms Regulations.
: Any disputes regarding the decision to designate or
: redesignate shall be resolved by the President.”
:
: WILLIAM J. CLINTON 11/15/96
:
: 1 if by land, 2 if by sea. Paul Revere – encryption 1775
:
: Charles R. Smith
: SOFTWAR
: http://www.us.net/softwar
The U.S. Constitution is in tatters, disappearing piece-by-piece,
emasculated by politicians constantly beating drums of War for
“Law & Order”.
The NSA Admits
--- --- ------
Ready?
Let’s start out with what the NSA will admit. (extra capitalization is mine)
- Court Says U.S. Spy Agency Can Tap Overseas Messages
- By David Burnham, The New York Times, 1982
- Washington, Nov 6 — A Federal appeals court has ruled that the National
- Security Agency may lawfully intercept messages between United States
- citizens and people overseas, even if there is no cause to believe they
- Americans are foreign agents, and then provide summaries of these messages
- to the Federal Bureau of Investigation.
- Because the National Security Agency is among the largest and most
- secretive intelligence agencies and because MILLIONS of electronic messages
- enter and leave the United States each day, lawyers familiar with the
- intelligence agency consider the decision to mark a significant increase in
- the legal authority of the government to keep track of its citizens.
- The mission of the NSA is to eavesdrop on electronic messages of foreign
- governments and protect the electronic communications of the United States.
- To accomplish these goals, the agency has SEVERAL THOUSAND listening posts
- around the world and a HUGE bank of computers in its heavily guarded head-
- quarters at Fort George Meade, MD, near Washington.
- A Special Senate Intelligence Committee report in 1975 found that the
- computer system functioned like a “GIANT VACUUM CLEANER” capable of
- sweeping in ALL ELECTRONIC MESSAGES to and from the United States.
- [snip]
- Mr. Jabara is a lawyer who for many years has represented Arab-American
- citizens and alien residents in court. Some of his clients had been
- investigated by the FBI.
- [snip]
- The FBI’s investigation of Mr. Jabara, who has not been formally accused
- or indicted for any crimes, began in August 1967. In November 1971, the
- Government acknowledged, the FBI asked the NSA “to supply any available
- information” about the lawyer that “might come into its possession during
- the course of its foreign intelligence activities”.
- As a result, the NSA provided the FBI summaries
- of six overseas conversations of Mr. Jabara.
- In earlier court proceedings, the FBI acknowledged that it then
- disseminated the information to 17 other law-enforcement or intelligence
- agencies and three foreign governments.
- [snip]
- John Shattuck, Washington director of the ACLU, who represented Mr. Jabara
- said “It is difficult to imagine a more sweeping judicial approval of
- government action in violation of constitutional rights than the decision
- of the panel is this case. Taken to its logical conclusion, the decision
- authorizes the Federal Government to restructure its surveillance
- activities so that any Federal law-enforcement or intelligence
- investigation requiring the interception of private communications could
- be conducted WITHOUT A JUDICIAL WARRANT simply by turning to the NSA.”
- Under current laws, if the FBI wants to eavesdrop legally on the conversation
- of a criminal it must obtain a warrant from a Federal judge. In those cases
- where the FBI wants to eavesdrop on a specific individual who it believes
- is an agent of a foreign government, it can apply for a warrant from a
- special SECRET PANEL of Federal judges established just for that purpose.
- The special missions and advanced technology of the NSA however, make its
- operations more difficult to control within the restrictions of the Federal
- wiretapping and surveillance laws.
- According to the 1975 report of the Special Senate Intelligence Committee,
- the agency has equipment that “sweeps up enormous numbers of communications,
- not all of which can be reviewed by intelligence analysts.”
- Using “watch lists” — lists of words and phrases designed to identify
- communications of intelligence interest — NSA computers scan the mass of
- acquired communications to select those which may be of specific foreign
- intelligence interest”, the report said.
* - The court ruled Fourth Amendment rights were not violated.
- The Senate investigation in 1975 uncovered evidence the overseas
- communications of a number of individuals engaged in organizing
- political protests against the war in Vietnam were subjected to
- surveillance by the NSA equipment.
Mini-recap:
o The NSA can listen in on all American citizens' border-crossing
communications of any sort without a warrant or any other court
procedure, and effectively distribute that information to any and
all local law-enforcement agencies. And foreign governments.
Loss of Fourth Amendment rights.
Not even discussed with the American public.
Not even debated by our elected representatives.
o Domestic law enforcement agencies can request, receive, and widely
disseminate this information without any laws interfering. A major
blurring of the lines between Military and civilian control.
o Requests for political reasons are acceptable. (last paragraph)
o The NSA uses a huge number of computers to listen for "key words"
on "watch lists" for ALL border crossing traffic, including voice
conversations. That means in 1975 they could convert voice to text,
then do keyword searches against it. It's 1997 now.
Just how did United States citizens lose these Fourth Amendment rights,
granted by the Constitution? And why is the Military monitoring the
communications of Americans on U.S. soil and working with domestic law
enforcement?
Well, one day President Truman issued a secret order creating the NSA.
As testified by Library of Congress members on C-SPAN, the names of these
presidential findings change with administrations. They are called variously
Presidential Decision Directives, National Security Council Decision
Directives, Executive Orders, etc.
One might think these special override-the-constitution presidential
directives (which came out of nowhere) would be used for short-term
emergencies.
Wrong: the NSA is now a HUGE intelligence organization, eating billions
and billions and billions and billions of dollars in budgets each year,
and monitoring billions of messages a day.
- “Spying Budget Is Made Public By Mistake”, By Tim Weiner
- The New York Times, November 5 1994
- By mistake, a Congressional subcommittee has published an unusually
- detailed breakdown of the highly classified “black budget” for United
- States intelligence agencies.
- In previously defeating a bill that would have made this information
- public, the White House, CIA and Pentagon argued that revealing the
- secret budget would cause GRAVE DAMAGE to the NATIONAL SECURITY of
- the United States.
- $3.1 billion for the CIA
- $10.4 billion for the Army, Navy, Air Force
- and Marines special-operations units
- $13.2 billion for the NSA/NRO/DIA
- The only damage done so far is to the
- credibility of those who opposed the measure.
There is no constitutional basis for this
massive loss of Fourth Amendment rights.
It sounds like some wild conspiracy theory, doesn’t it?
Yet it exists.
Secret Court
------ -----
: The Washington Post Magazine, June 23 1996
: Government surveillance, terrorism and the U.S. Constitution:
: The story of a Washington courtroom no tourist can visit.
: By Jim McGee and Brian Duffy [snipped article excerpts shown here]
: Adapted from the book “Main Justice”, 1996, ISBN 0-684-81135-9.
:
- Last year, a secret court in the Justice Department authorized a record
- 697 ‘national security’ wiretaps on American soil, outside normal
- constitutional procedures.
- The Foreign Intelligence Surveillance Act, is a 1978 law that permits
- secret buggings and wiretaps of individuals suspected of being agents
- of a hostile foreign government or international terrorist organization
- EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
- The FISA court operates outside the normal constitutional standards for
- searches and seizures. Non-government personnel are not allowed.
- The courts files cannot be publicly reviewed.
- The average U.S. citizen might reasonably assume use of this court
- is at the least: unusual.
- It is not. In fact, in the United States today it is increasingly
- common. In 1994, federal courts authorized more wiretaps for
- intelligence-gathering and national security purposes than they
- did to investigate ordinary federal crimes.
* - The review process to prevent legal and factual errors is virtually
- non-existent.
* - And the FISA system’s courtroom advocacy is monumentally one-sided.
- The court has never formally rejected an application. Not once.
*
- The court has never formally rejected an application. Not once.
- For the first time in modern U.S. history, the Congress had
- institutionalized a process for physical searches outside of
- Fourth Amendment standards.
* - Not even Congress’ intelligence oversight committees review these
- special cases on a regular basis.
Mini-recap:
o Congress voted into existence a court that bypasses our normal
Fourth Amendment constitutional rights. Poof they're gone.
o Congressional oversite is weak.
Such a special court should be subject to the
highest standard of continual scrutiny: it is not.
! The New York Times, December 29, 19??, by David Burnham
!
! Because the National Security Agency is actively involved in the
! design [of Key Recovery cryptography], the agency will have the
! technical ability to decipher the messages.
!
! Walter G. Deeley, NSA deputy director for communications security
! said, “Another important safeguard to the privacy of communications
! was the continuous review of NSA’s activities by the Senate and House
! intelligence committees.”
Congressional oversite in real-time was non-existent.
Remember Ronald “I am a Contra” Reagan?
U.S. Department of Justice, Federal Bureau of Investigation, March 13, 1987
Dear [Guy],
Your letter of February 25th in which you inquired about the
association between Mr. Frank Varelli and the FBI has been received.
An internal FBI inquiry is currently ongoing into the activities of
an Agent associated with Mr. Varelli who left the FBI following an earlier
administrative inquiry. For that reason, it would be premature at this
point to respond to any questions concerning the matter.
Sincerely,
William M. Baker
Assistant Director
Office of Congressional and Public Affairs
#
Bicentennial of the United States Constitution (1787-1987)
- [NJ] The Star-Ledger, Friday, January 29, 1988
- The documents, released Wednesday, showed that the original target of the
- FBI probe was CISPES, but that the investigation broadened to include
- more than 100 other groups that opposed Reagan administration policy in
- Nicaragua and El Salvador.
- Despite the long investigation, no criminal charges were ever brought
- against any of the groups or their members.
- An FBI statement issued Wednesday said the agency only investigated
- suspected crimes, not political beliefs or constitutionally protected
- freedom of speech.
- Oliver Revell, the FBI’s executive assistant director, said that the
- FBI did not investigate CISPES because of its political activities,
- but for a “wide range of possible crimes.”
% The New York Times, Thursday, February 4, 1988
% “Reagan Backs FBI Over Surveillance”
%
% President Reagan is satisfied that the Federal Bureau of Investigation
% conducted a proper surveillance campaign against groups opposed to his
% policies in Central America, the White House said today.
%
% The new FBI Director William S. Sessions assured Reagan that there was
% a solid basis for the investigation: “We knew CISPES was established
% from funding by the Communist Party, U.S.A.”
Well, Reagan didn’t like a peaceful Texas based group called CISPES, which
was against the United States’ support of the El Salvador government.
The El Salvador government was torturing and killing people.
- “Officers held in Salvador Abductions”, By James LeMoyne, NYT, 4/25/86
- One of those arrested was accused of killing the head of the Salvadoran
- Land Reform Institute and two AMERICAN agrarian advisors.
So the FBI had one of their agents infiltrate CISPES using a Frank
Varelli, who was born in San Salvador and served in the U.S. Army.
“How the FBI infiltrated CISPES and Assisted the Salvadoran Right Wing”
By James Ridgeway, The Village Voice, NYC
Varelli met with the Salvadoran National Guard, best known for its
death squads. They gave him a “hit list” of people they wanted.
When the INS stopped a Salvadoran immigrant, it would call the FBI and
check the name against the list.
If the detained person’s name was on the list, the INS would institute
deportation proceedings, opposing bail on “national security” grounds.
Varelli would call the Salvadoran National Guard to let them know the
individual was on his way home. In this way, the FBI assisted, over a
three-year period, the work of the Salvadoran death squads.
That’s right: the FBI murders people.
- “FBI Killed Unarmed Man, Inquiry Shows”, The New York Times, 1/14/97
- A 21-year-old murder suspect who the FBI said they shot only after he
- opened fire on them, was unarmed when he was killed.
- A spokesman for the FBI, Ann Todd, declined to discuss the discrepancy
- between the FBI’s initial report that Mr. Byrd had shot at members of
- the FBI task force and the subsequent discovery by the Union County
- Prosecutor that he was unarmed.
- The FBI shot Mr. Byrd to death as he hid under a bed from them.
The FBI had Varelli “plant” a gun.
Thus giving CISPES a terrorist organization designation.
Not only did the FBI hassle them big time, but also the FBI/NSA broke
nationwide into homes and offices that were associated with them and
many other groups, including lawyers offices and churches.
In almost every incident, documents and files were ransacked while office
equipment and other valuable items were left untouched.
“Foes of Reagan Latin American Policies Fear They’re Under Surveillance”
By David Burnham, The New York Times, April 19, 198?
Among those who have cited incidents Sara Murray, staff organizer with
the Michigan Interfaith Committee on Central American Rights, said that
her organization made three separate first-class mailings in the last
few months but that only one out of about 100 letters was ever delivered.
The Post Office denied any responsibility.
#
Miss Murray also said someone had broken into her Detroit office and
stolen a mailing list, several files and two books. [snip]
A free-lance journalist has brought a suit in Federal District Court
charging that when he returned from Nicaragua the Customs Bureau detained
him until FBI agents came and seized his diary and address book.
The FBI admitted to interviewing more than 100 people who visited
Nicaragua, but said they were acting under Presidential Executive Order.
Two women have come forward to complain the IRS audited them IMMEDIATELY
AFTER RETURNING FROM NICARAGUA.
The IRS denied it had anything to do with political views: “One woman has
never earned more than 12,000 a year, and we found that suspicious.”
FBI director Sessions ended up apologizing BIG TIME on C-SPAN,
saying that sort of thing would NEVER happen again. “We have put
procedures in place so that that will NEVER happen again”.
But, after having been granted the special powers of the court by
Congress, noone was arrested and tried for this MASSIVE abuse of
power, which was granted by Congress in the good faith that the
government would not trade off the Bill of Rights in order to
pursue political objectives.
It was a worst-case disaster.
Even after investigating, Congress basically yawned: “The CISPES case was
an aberration, it was lower-level FBI employees who got carried away by
their national security mandate. It was not politically motivated”
— The Senate Select Intelligence Committee.
- “Above the Law”, by David Burnham, ISBN 0-684-80699-1, 1996
- …something much more sinister was at work. In his carefully documented
- analysis of the CISPES matter, ‘Break-ins, Death Threats and the FBI: the
- Covert War Against the Central American Movement’, Boston writer Ross
- Gelbspan argues that a much more extensive conspiracy may have been at
- work. Far from being a low-level operation, Gelbspan reports, hundreds
- of documents in the CISPES file had been initialed by Oliver “Buck”
- Revell, then the number two official in the FBI. [Further evidence
- implicates the CIA]
Congress is unable to investigate the FBI, let alone the NSA.
“U.S. Recruited Ex-Rebel Despite Links to Deaths, Report Says”
By Tim Golden, The New York Times, January 21, 1997
A former Salvadoran guerrilla commander was recruited by American officials
as a paid informer and allowed to resettle in the United States despite
intelligence information from half a dozen rebels that he had planned a
1985 attack in El Salvador in which SIX AMERICANS and seven others were
killed, newly released Government reports show.
It doesn’t matter to our government if Americans get killed.
Whatever the president wants, he gets.
FISA is yet another dagger shredding the U.S. Constitution.
: The Washington Post Magazine, June 23 1996
: “Government surveillance, terrorism and the U.S. Constitution”
: from Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9
:
: The internal Justice Department FISA watchdog was Mary Lawton: it took
: her two years before saying the investigations into CISPES & Co should
: be shut down.
:
: On the day after Thanksgiving in 1993, not quite a month after Mary Lawton
: died, Richard Scruggs decided it was time to go through her office on the
: sixth floor of Main Justice.
:
: The deeper Scruggs got into the FISA files, the more uneasy he grew.
:
: Reading the FISA applications in Lawton’s files, Scruggs began finding
: errors. The volume of FISA cases was so heavy that the lawyers could spend
: only so much time on each one.
:
: “The review process to prevent factual and legal errors was virtually
: nonexistent,” Scruggs recalled.
:
: In high school, Mary Lawton had won a debate about the meaning of the
: U.S. Constitution.
Nor was it an aberration: the 1980s joined the 1960s and 1970s with yet
another massive use of this Orwellian technology for political purposes.
And these are when they were caught.
It’s currently used for the “Drug War”, a highly political endeavor.
Of course, once CISPES was designated as a terrorist organization…
: The Washington Post Magazine, June 23 1996
:
- The CISPES investigation expanded. The FBI conducted a MASSIVE NATIONWIDE
- investigation that put under surveillance ONE THOUSAND THREE HUNDRED THIRTY
- liberal groups, many of them religious or political organizations.
By definition, ECHELON surveillance of 1,330 groups is NOT an “aberration”.
The state of Congressional oversight (and punishment of FISA violations)
is horrifying.
Not only did the NSA/FBI use FISA in a criminal manner, they then cross-
referenced through everyone ever connecting to CISPES – no matter how
distant – to achieve massive domestic spying for political purposes.
To crush peaceful lawful political protest.
In America.
For the President.
And they did it WITHOUT getting 1,330 FISA warrants.
Question: How do you spy on 1,330 domestic groups?
Answer: Electronically, using an existing domestic surveillance network.
Just push the button marked 'monitor'.
Your phone calls, bank transactions, credit card usage, health/
credit/utility/law-enforcement/TRW/IRS records, your whole life.
One big evil eye of Mordor.
The Russian State we were told to fear.
No wonder there are militias.
It gets worse.
Much worse.
Wild Conspiracy Theory
---- ---------- ------
This is an expanded version of a posting I made promoting unregulated
(free from government-has-the-key) cryptography.
Attorney John Loftus is the author of four histories of intelligence
operations. As a former prosecutor with the U.S. Justice Department’s
Nazi-hunting unit, he had unprecedented access to top-secret CIA and
NATO archives. Mark Aarons is an investigative reporter and author of
several books on intelligence related issues.
One day I was flipping channels, and came across “The Leon Charney Show”.
Attorney Charney was interviewing Attorney Loftus, who has many many
connections in the intelligence world.
Mr. Loftus described a room in NSA’s Fort Meade that was actually British
soil (diplomatic territory), with a British guard posted outside…
: From: guy@panix.com [updated here 5/25/97]
: Subject: Re: Threaten U.S. Domestic ECHELON
: Newsgroups: alt.cypherpunks,talk.politics.crypto,comp.org.eff.talk
: Organization: NYC, Third Planet From the Sun
:
: This is a heavily annotated book.
:
: Massive domestic spying by the NSA.
:
: Including our phone calls.
:
: * “The Secret War Against the Jews”
: * Authors: John Loftus and Mark Aarons
: * ISBN 0-312-11057-X, 1994
: *
: * In 1943 this resulted in the Britain-USA (Brusa) agreement to merge
: * the Communications Intelligence (COMINT) agencies of both governments.
: *
: * One of the little-known features of Brusa was that President Roosevelt
: * agreed that the two governments could spy on each others’ citizens,
: * without search warrants, by establishing “listening posts” on each
: * others’ territory.
[snip]
: *
: * According to several of the “old spies” who worked in Communications
: * Intelligence, the NSA headquarters is also the chief British espionage
: * base in the United States. The presence of British wiretappers at the
: * keyboards of American eavesdropping computers is a closely guarded
: * secret, one that very few people in the intelligence community have
: * been aware of, but it is true.
: *
: * An American historian, David Kahn, first stumbled onto a corner of
: * the British connection in 1966, while writing his book The Codebreakers.
: *
: * One indication of just how sensitive this information is considered on
: * both sides of the Atlantic is the fact that Kahn’s publishers in New
: * York and London were put under enormous pressure to censor a great deal
: * of the book. In the main, Kahn simply revealed the existence of the
: * liaison relationship, but when he wrote that the NSA and its British
: * equivalent, the Government Communications Headquarters, “exchange
: * personnel on a temporary basis”, he had come too close to revealing
: * the truth.
: *
: * The U.S. government told Kahn to hide the existence of British
: * electronic spies from the American public. Kahn eventually agreed
: * to delete a few of the most sensitive paragraphs describing the
: * exchange of codes, techniques, and personnel with the British
: * government
: *
: * His innocuous few sentences threatened to disclose a larger truth.
: *
: * By the 1960s the “temporary” British personnel at Fort Meade had
: * become a permanent fixture. The British enjoyed continued access
: * to the greatest listening post in the world.
: *
: * The NSA is a giant vacuum cleaner. It sucks in every form of
: * electronic communication. from telephone calls to telegrams,
: * across the United States. The presence of British personnel
: * is essential for the American wiretappers to claim plausible
: * deniability.
: *
: * Here is how the game is played. The British liaison officer at
: * Fort Meade types the target list of “suspects” into the American
: * computer. The NSA sorts through its wiretaps and gives the
: * British officer the recording of any American citizen he wants.
: *
: * Since it is technically a British target of surveillance, no
: * American search warrant is necessary. The British officer then
: * simply hands the results over to his American liaison officer.
: *
: * Of course, the Americans provide the same service to the British
: * in return. All international and domestic telephone calls in Great
: * Britain are run through the NSA’s station in the British Government
: * Communications Headquarters (GCHQ) at Menwith Hill, which allows
: * the American liaison officer to spy on any British citizen without
: * a warrant.
: *
: * According to our sources, this duplicitous, reciprocal arrangement
: * disguises the most massive, and illegal, domestic espionage apparatus
: * in the world. Not even the Soviets could touch the U.K.-U.S. intercept
: * technology.
: *
: * Through this charade, the intelligence services of each country can
: * claim they are not targeting their own citizens. This targeting is
: * done by an authorized foreign agent, the intelligence liaison
: * resident in Britain or the United States.
: *
: * Thus, in 1977, during an investigation by the House Government
: * Operations Committee, Admiral Inman could claim, with a straight face,
: * that “there are no U.S. Citizens now targeted by the NSA in the United
: * States or abroad, none.”
: *
: * Since the targeting was done not by NSA but by employees of British
: * GCHQ, he was literally telling the truth.
[snip]
: *
: * According to a former special agent of the FBI, the you-spy-on-mine,
: * I’ll-spy-on-yours deal has been extended to other Western partners,
: * particularly Canada and Australia. The British, with the help of
: * sophisticated NSA computers, can bug just about anyone anywhere. The
: * electronic search for subversives continues, particularly in the U.S.
: *
: * The NSA conceded precisely that point when the U.S. Justice Department
: * investigated its wiretapping of American protesters during the Vietnam
: * War.
: *
: * The NSA assured the Justice Department that the information was
: * acquired only incidentally as part of a British GCHQ collection
: * program.
: *
: * The “incidental” British exception has become the rule.
: *
: * To this day Congress does not realize that the British liaison officers
: * at the NSA are still free to use American equipment to spy on American
: * citizens. And, in fact, they are doing just that. Congress has been kept
: * in the dark deliberately.
: *
: * This is a fact, not a matter of conjecture
: * or a conclusion based on anonymous sources.
: *
: * In the early 1980s, during the Reagan administration, one of the authors
: * of this book submitted to the intelligence community a draft of a
: * manuscript that briefly described the wiretap shell game and mentioned
: * the secrecy provisions concerning British liaison relationships with
: * the NSA have escaped congressional knowledge.
: *
: * The result was an uproar.
: *
: * The intelligence community insisted that all passages explaining the
: * British wiretap program had to be censored and provided a list of
: * specific deletions.
Mini-recap:
o The countries sharing intelligence: US, UK, Canada, Australia
o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls.
o Circumvention of domestic spy laws via friendly "foreign" agents.
But could that be true?
Could such a massive disregard for the Constitution have taken place under
the cheesy logic said to be used by the Military? NSA is Military, headed
by a uniformed officer.
Could it possibly be true?
It’s some over-the-top conspiracy theory, right?
Over the Top
---- --- ---
I haven’t received the “Spyworld: Inside the Canadian and American
Intelligence Establishments” book by Mike Frost yet.
So for now I’ll quote from his article in CAQ, an issue entitled “The New
Age of Surveillance”.
Covert Action Quarterly, Winter 1996-97, Number 59
1500 Massachusetts Ave. NW #732
Washington, DC 20005
202/331-9763, caq@igc.org, http://mediafilter.org/caq
Article: “Second Thoughts from the Second Oldest Profession.
Inside the US-Canada Spyworld.”
By Mike Frost
[ Pictured is him on two of his Canadian security IDs ]
I was a spy. For almost two decades, I spied for Canada’s Communications
Security Establishment (CSE), the most secret and least known branch of
National Defense. But although my paycheck came from the Canadian government,
more often than not, my orders, assignments, and much of my training —
like those of many other CSE operators — came from the National Security
Agency (NSA) in Fort Meade, Maryland.
Over the twelve years I spied for CSE, it became increasingly to resemble
the NSA. Both specialize in providing secure communications and signals
intelligence (SIGINT); both operated for years with little public knowledge
or legislative oversight until they were exposed by the media.
[snip]
Despite the similarities, CSE is treated more like a subsidiary than an
equal partner. US military and economic clout, as well as NSA’s vastly
superior technical capabilities and near unlimited funds, allow Washington
to dominate.
And while CSE has only a $200-300 million dollar budget, NSA has an
estimated annual budget of almost $4 billion.
But the relationship is not without mutual benefits. CSE, NSA, and Britain’s
Government Communications Headquarters (GCHQ) use each other’s facilities
and personnel to spy on friend and foe alike and, more alarmingly, to
circumvent domestic laws and spy on their own populations.
[snip]
I either participated in or had direct knowledge of operations in which
CSE operated alone or joined with NSA or GCHQ to:
o intercept communications in other countries from the confines of
Canadian embassies around the world with the knowledge of the
ambassador;
o aid politicians, political parties, or factions in an allied country
to gain partisan advantage
o spy on its allies
o spy on its own citizens; and
o perform “favors” that helped its allies evade domestic laws against
spying.
[snip]
Although I visited NSA headquarters at Fort Meade dozens of times, it was
at the Special Collection Services (SCS) at College Park, Maryland, that
I received my covert operation training and assignments.
This facility, set in suburban Washington, DC, dealt exclusively with
covert operations. [The facility was relocated closer to Fort Meade in
the early 1990s]
The first time I was driven there in 1978, I entered through a strip mall
and then through a door in the back of a restaurant; the second time, via
a dry cleaners.
These dinky businesses in a fake shopping center were all owned, operated,
and staffed by US espionage agencies. From the street, the installation’s
high-tech capacity, its antennae and satellite receptors, were camouflaged
and it is unlikely that neighbors suspected anything out of the ordinary.
But the inside was anything but ordinary. There were scores of rooms crammed
with administrative functions, equipment, wires, jury-rigged gizmos, a
currency bank, and computers.
Every electronic intercept capability NSA denied having was right there.
In a small black box, not much bigger than a briefcase, was “Oratory.”
This portable key-word selection computer could be taken almost anywhere
and set to pick out pre-selected words and automatically monitor and
record fax, voice, or teletype messages that contained them.
Developed by NSA, “Oratory” was “tempest-proof” (i.e. shielded to
prevent emmisions that could lead to detection), small, virtually
indestructible, and easy to repair: all you had to do was open the
lid and replace the self-diagnosed defective component.
[snip]
In pursuit of plausible deniability, CSE, GCHQ, and NSA have used each
others’ personnel and resources to evade laws against domestic spying.
[ an example given in which the NSA wanted to spy on someone within
the US, even though they had no authorization for such an operation ]
…So, two Canadians were sent to conduct a counter-espionage operation
on US soil at US taxpayer expense so that NSA could maintain deniability.
In every way that counts, NSA broke US law and spied on its own citizens.
[ A UK operation by CSE described next. Margaret Thatcher (then Prime
Minister) thinks two of the ministers in her cabinet are not ‘on side’
…so she wants to find out if they are… So GCHQ asked CSE operators
to come to London to bug the ministers ]
Increasingly though, both because it’s possible and because it’s desired,
individuals are caught in the broad net of electronic surveillance.
The experts can record and analyze all your communications at will.
SIGINT organizations in Canada, US, UK, Australia, and New Zealand use
supercomputers such as the Cray to select items of interest. The list
is very fluid and is adapted rapidly to monitor people and policy areas.
At any time, it is likely to contain names of all world leaders, terrorists,
drug lords, mafia dons, members of radical groups, labor union activists
and leaders, types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.
As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.
Under development is even more sophisticated “topic recognition” which
can home in on guarded conversations that avoid potential trigger words.
Nothing and no one is exempt.
For example, you are talking on the telephone to a friend discussing
your son’s school play. “Boy,” you say sadly, “Bobby really bombed last
night,” or perhaps you use the word “assassination” or “sabotage” or any
one of the key words the computer has been told to flag.
A hard copy of your conversation is produced, passed to the appropriate
section (in this case terrorism), and probably ends up in the garbage.
But perhaps the conversation is not so clear-cut or the analyst has poor
judgement. Then your name is permanently filed under “possible terrorist”.
Weeks or even years later, you have a similar conversation and use the
same words; the computer filters it out again. Since this is your second
time, your name moves from the “possible” to the “probable” file.
Sound absurd? Not at all; it actually happened while I was at CSE.
[snip]
SIGINT specialists are honing their skills at monitoring digital
information. SIGINT agencies everywhere are increasingly throwing
their surveillance web over the Internet and other data networks
of interest.
[snip]
Mini-recap:
o The countries sharing intelligence: US, UK, Canada, Australia,
New Zealand
o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls, via keyword searches.
o Circumvention of domestic spy laws via friendly "foreign" agents
Wow.
How chilling to think the military has set up
a real-life domestic Orwellian spy apparatus.
Used repeatedly for political purposes.
ECHELON has almost no Military purpose left:
Russia is practically part of NATO now.
We must start dismantling ECHELON before it is too late.
6/3/97: Barnes & Noble informs me his book is no longer
available, and that my order is cancelled.
BAM-BAM-BAM
--- --- ---
Let’s pause to take a look back at the first and still classic expose of NSA.
: The Puzzle Palace
: Inside the National Security Agency,
: America’s most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5
Page numbers are from the above 1983 release.
Ready?
P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA’s relationship with its supersecret British partner, GCHQ. “The
two agencies exchange personnel on a temporary basis… A similar but much
smaller liaison program is maintained with Canada and Australia.”
P399: After two years of compromising and negotiating, the BRUSA Agreement
was supplemented in 1947 by the five-power UKUSA Agreement, which,
according to one report, established the United States as a first party
to the treaty, and Britain, Canada, and Australia-New Zealand as second
parties.
P391: …quite likely the most secret agreement ever entered into by the
English-speaking world. Signed in 1947 and known as the UKUSA Agreement,
it brought together under a single umbrella the SIGINT organizations of
the United States, Britain, Canada, Australia and New Zealand. The UKUSA
Agreement’s existence has never been officially acknowledged by any country
even today.
P271: Sharing seats alongside the NSA operators, at least in some areas,
are SIGINT specialists from Britain’s Government Communications Headquarters
(GCHQ). According to a former Menwith Hill official, the two groups work
very closely together.
P229: David Watters, a telecommunications engineer once attached to the
CIA’s communications research and development branch, pulls out a microwave
routing map of the greater Washington area and jabs his index finger at a
small circle with several lines entering it and the letters NSA. “There’s
your smoking pistol right here.” Watters says it is tied into the local
telephone company circuits, which are interconnected with the national
microwave telephone system owned by AT&T. Other specialists testified to
the same thing: purely domestic intercepts.
P223: “Technical know-how” for microwave communications intercept was
aided by William Baker, head of AT&T’s Bell Laboratories and at the
same time an important member of the very secret NSA Scientific Advisory
Board. After all, it was Bell Labs under Baker that, to a great extent,
developed and perfected the very system that the NSA hoped to penetrate.
[
“The Rise of the Computer State”, David Burnham, 1984, ISBN 0-394-72375-9
“A Chilling Account of the Computer’s Threat to Society”
FYI note: this document’s opening quote is from this book.
P122: For the last three decades the NSA has been a frequent and secret
participant in regulatory matters before the Federal Communications
Commission, where important decisions are made that directly affect
the structure of the telephone company, the use of radio airwaves and
the operation of communication satellites.
]
P317: 1962. Now, for the first time, NSA had begun turning its massive ear
inward toward its own citizens. With no laws or legislative charter to
block its path, the ear continued to turn.
P319: The Secret Service, the CIA, the FBI and the DIA submitted entries
for the NSA’s watch list.
The names on the various watch lists ranged from members of radical political
groups to celebrities to ordinary citizens involved in protest against their
government.
Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin
Spock, Dr. Martin Luther King Jr., the Reverand Ralph Abernathy, Black
Panther leader Eldridge Cleaver, and Chicago Seven defendants Abbie Hoffman
and David T. Dellinger.
A frightening side effect of the watch list program was the tendency of most
lists to grow, expanding far beyond their original intent. This multiplier
effect was caused by the inclusion of names of people who came in contact
with those persons and organizations already on the lists.
Because of the NSA’s vacuum cleaner approach to intelligence collection —
whereby it sucks into its system the maximum amount of telecommunications and
then filters it through an enormous screen of “trigger words” — analysts end
up reviewing telephone calls, telegrams, and telex messages to and from
thousands of innocent persons having little or nothing to do with the actual
focus of the effort.
And when a person made the
watch list, any conversations
EVEN MENTIONING
that person are scooped up.
P333: By now, the names of U.S. citizens on NSA’s many watch lists for
fighting the drug war had grown from the hundreds into the thousands.
Even when Noel Gayler took over as Director of the NSA in August 1969,
NSA personnel waited a year or so before briefing even him on the NSA
watch list program.
P381-382: NSA Director General Allen testified to Congress that there is no
statute that prevents the NSA from interception of domestic communications.
Asked whether he was concerned about the legality of expanding greatly its
targeting of American citizens, the NSA replied: “Legality? That particular
aspect didn’t enter into the discussions.”
P459: Innocent Americans – people neither targeted nor watch-listed – are
scooped up into the NSA’s giant vacuum cleaner. This happens with
considerable frequency because of the way in which names and phrases are
jam-packed into the computers. Even though NSA’s specialized supercomputers
have enormous storage capacities, the tremendous number of targets forces
the Agency to squeeze the watch lists together as tightly as possible.
P462-465: Its power to eavesdrop, the NSA had always insisted, came under no
earthly laws but rather emanated from some celestial “inherent presidential
authority” reposed in the chief executive by the Constitution.
Senator Edward M. Kennedy tried year after year to pass legislation to
require the NSA to submit to judicial review.
Finally, the Foreign Intelligence Surveillance Act [FISA] was signed into
law by president Carter on October 25, 1978.
The key to the legislation could only have been dreamed up by Franz Kafka:
the establishment of a supersecret federal court.
The legislation established a complex authorization procedure and added a
strict “minimization” requirement to prohibit the use and distribution of
communications involving Americans inadvertently picked up during the
intercept operations.
These requirements constitute the most important parts of the FISA law, and
were included to prevent the watch-listing of American citizens, which took
place during the 1960s and 1970s.
The Supreme Court Chief Justice picks which federal judges serve in the
Star Chamber.
P466-467: The FISA court judge rules that black-bag jobs of “nonresidential
premises under the direction or control of a foreign power” need no court
approval. The FISA legislation also exempts from judicial review communica-
tions of these sites, including embassies. P464: A final judicial review
exception authorized the Agency to distribute the communication if it relates
to criminal activity.
* * * * * * * * * *
* * * * * * * * * *
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *** *** *** *** *** *** *** *** *** ***
- * * * * * * * * *
P468-469: Within the United States, FISA still leaves the NSA free to pull
into its massive vacuum cleaner every telephone call and message entering,
leaving, OR TRANSITING the country.
By carefully inserting the words “by the National Security Agency” into the
FISA legislation, the NSA has skillfully excluded from the coverage of the
FISA statute as well as the surveillance court all interceptions received
from the British GCHQ or any other non-NSA source.
Thus it is possible for GCHQ to monitor the necessary domestic circuits
and pass them on to the NSA through the UKUSA Agreement, giving them
impunity to target and watch-list Americans.
* * * * * * * * * *
*** *** *** *** *** *** *** *** *** ***
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * * * * * * * * *
- * * * * * * * * *
P475: Three decades after its creation, the NSA is still without a formal
charter. Instead, there is a super hush-hush surveillance court that is
virtually impotent; the FISA, which has enough loopholes and exceptions to
render it nearly useless; and an executive order that was designed more to
protect the intelligence community from citizens than citizens from the
agencies. In addition, because it is an executive order, it can be changed
at any time at the whim of a President, without so much as a nod toward
Congress.
P471: On January 24, 1978, President Jimmy Carter issued an executive order
imposing detailed restrictions on the nation’s intelligence community. The
order was designed to prevent the long list of abuses of the 1960s and 1970s.
But four years later President Ronald Reagan scrapped the Carter order and
broadened considerably the power of the spy agencies to operate domestically.
P473: Under the Reagan executive order, the NSA can now, apparently, be
authorized to lend its full support – analysts as well as computers – to
“any department or agency” in the federal government and, “when lives are
endangered,” even to local police departments.
[ Yea billions of dollars a year military SIGINT support technology…
oh so invisible in its great mass.
A total blurring of the lines between Military
and civilian control of the domestic population.
]
P475-477: Like an ever-widening sinkhole, the NSA’s surveillance technology
will continue to expand, quietly pulling in more and more communications and
gradually eliminating more and more privacy.
If there are defenses to such technotyranny, it would appear, at least from
past experience, that they will not come from Congress.
Rather, they will most likely come from academe and industry in the form of
secure cryptographic applications to private and commercial telecommunications
equipment.
The same technology that is used against free speech can be used
to protect it, for without protection the future may be grim.
Senator Frank Church, chairman of the Senate Intelligence committee, referring
to the NSA’s SIGINT technology:
At the same time, that capability at any time could be turned around
on the American people and no American would have any privacy left,
such is the capability to monitor everything: telephone conversations,
telegrams, it doesn't matter.
There would be no place to hide.
If the government ever became a tyranny, if a dictator ever took charge
in this country, the technological capacity that the intelligence commun-
ity has given the government could enable it to impose total tyranny,
and there would be no way to fight back, because the most careful effort
to combine together in resistance to the government, no matter how
privately it was done, is within the reach of the government to know.
Such is the capability of this technology...
I don't want to see this country ever go across the bridge.
I know the capacity that is there to make tyranny total in America, and
we must see to it that this agency and all agencies that possess this
technology operate within the law and under proper supervision, so that
we never cross over that abyss.
That is the abyss from which there is no return.
*** end of ‘Puzzle Palace’ excerpts.
Wow.
No recap necessary.
I'm feeling a bit sick at this point, how about you?
Those of you who supported any version of the FBI/NSA Digital Telephony Act
sold us down the river, making use of this Orwellian Military technology
fully legal domestically for the first time.
The descent into the abyss, from which there is no return.
: * “Above the Law”, by David Burnham, ISBN 0-684-80699-1, 1996
: *
: * [ Al Bayse was assistant director of the FBI’s Technical Services
: * Division, in charge of spending more than half a billion dollars
: * for research, development and computer operations. ]
: *
: * “Sure”, said Al Bayse of the FBI, “I believe there is an absolute
: * right to privacy. But that doesn’t mean you have the right to break
: * the law in a serious way. Any private conversation that doesn’t
: * involve criminality should be private”
: *
: * In other words, as the debate was framed by Bayse, the right to
: * privacy is at least partly contingent on a determination by an FBI
: * agent or clerk that the conversations they already intercepted and
: * understood do not involve a crime.
Do you want to live in a real live Big Brother world?
It is not at all about trying to keep up with technology in order to wiretap.
The phone companies are already able and authorized to listen in on any
line at any time, to check the integrity of the network.
I’ve heard some funny stories by old Bell System employees about a bunch of
people listening into private conversations, and having a hoot.
Question: How can the FBI use computers to monitor thousands and thousands
and thousands and thousands of phone calls simultaneously, as they
said they would do with the bill, when we Americans speak so many
different accents and languages?
Answer: Thirty years of fine tuning by the NSA, y’all.
The Digital Telephony Act will allow them to legally – at full
wiretapping capacity – dragnet-monitor the telephone network.
Each line monitored will not require a warrant.
And how did they get this CALEA legislation?
- “Government Access”, by Jim Warren
- At the administration’s pleading, the [Democrat-controlled] Congress
- rammed it through in less than two months, with no substantive hearings.
- Literally in the dark of night, without debate, it passed in the house
- by voice vote and two nights later by unanimous consent in the Senate,
- only minutes before adjourning to rush home for their important work:
- campaigning for re-election.
The NSA domestic watch-list is probably already stuffed
full enough to use the complete CALEA capacity.
You can select many more lines for monitoring than actually end up active
at the same time. The effect is indistinguishable from a MUCH larger
monitoring capacity.
Even greater when the software programmatically decides (at the FBI end) which
conversations to continue listening to.
I’m sure law-enforcement will be able to dynamically configure their
connection to the phone companies’ networks.
And probably cheat to use ECHELON to direct this programmatic control,
yielding no effective monitoring limit for domestic law-enforcement, and
domestic political control.
Law enforcement has absolutely no need for the Digital Telephony Act except
to give them their own access terminals and PRETEND there is a firewall
between what the Military is doing versus what the FBI is doing.
Of course, to monitor phone calls at full capacity,
the FBI will need to use Military surveillance software.
We’ve come a long way from requiring a person to listen to the first minute
of conversation to even decide whether the person could continue to monitor.
It’s a brave new world now.
We’re there.
Surprise.
Australian ECHELON Spotted
---------- ------- -------
- http://www.texemarrs.com, Living Truth Ministries 800/234-9673
Texe Marrs and his organization are big on the “Anti-Christ” aspects of all
the technology the UKUSA governments have deployed to monitor people.
I am just glad he knows the Beast when he sees it, that it is Evil (without
the people involved necessarily being evil in intent: agreed!) and that
unless we do something soon, it will be too late: Earth will become Hell.
His book-jacket bio: Texe Marrs was a career U.S. Air Force officer (retired).
He commanded communications-electronics and engineering units around the globe.
- “Project L.U.C.I.D.”, by Texe Marrs, 1996, ISBN 1-884302-02-5
- Appendix 2: World Surveillance Headquarters
- The report that follows, originally entitled “National Surveillance”, was
- written by Australia’s Peter Sawer and published in Inside News (P.O. Box
- 311, Maleny, Queensland 4552, Australia). It first came to my attention
- when it was printed in the U.S. by LtCol Archibald E. Robert’s Bulletin,
- the newsletter of the highly respected Committee to Restore the Constitu-
- tion (P.O. Box 986, Fort Collins, Colorado 80522).
- The article caused a flurry of activity and a round of vigorous denials,
- admissions, coverups, and more denials by Australian political leaders.
- The article contends that (1) America’s National Security Agency (NSA)
- is the world surveillance headquarters, and (2) Australia has it’s own
- secret “computer center”, linked with the NSA via satellite, which
- illegally watches over Australia’s citizenry.
Article snippets… capitalization by the original authors…
- On a fateful fall day in America, on November 4th, 1952, a new United
- States government agency quietly was brought into existence through
- presidential decree.
- The birth of the National Security Agency on that day so long ago
- heralded the beginning of the world’s most sophisticated and all
- encompassing surveillance system, and the beginnings of the greatest
- threat to individual liberty and freedom not only in Australia, but
- the entire planet will ever see.
- The NSA grew out of the post war “Signals Intelligence” section of the
- U.S. War Department. It is unique amongst government organizations in
- America, and indeed most other countries, in that there are NO specified
- or defined limits to its powers.
- The NSA can (and does) do just about whatever it wants, whenever, and
- wherever it wants. Although little known in both the U.S. and elsewhere,
- the NSA is quite literally the most powerful organization in the world.
- Not limited by any law, and answerable only to the U.S. National Security
- Council through COMSEC, the NSA now controls an information and
- surveillance network around the globe that even Orwell, in his novel
- “1984”, could not have imagined.
- Most people believe that the current “computer age” grew out of either
- the space program or the nuclear weapons race; it did not.
- ALL significant advances in computer technology over the last thirty
- years, from the very beginnings of IBM, through to the super computers
- of today, have been for the NSA. In fact, the world’s very first super
- computer, the awe-inspiring CRAY, was built to specification for the
- NSA, and installed in their headquarters in 1976.
- The entire twentieth century of development of computer technology has
- been the result of the NSA’s unquenchable thirst for ever bigger, ever
- faster machines on which to collect, collate, and cross-reference data
- on hundreds of millions of honest, law-abiding, and totally unsuspecting
- individuals. And not only in America, but in many other countries as
- well. Including, as we shall see, Australia.
[
“The Rise of the Computer State”, David Burnham, 1984
p134: ...the technical advances that were occurring did so not entirely
by chance. The computers' ability to acquire, organize, store and
retrieve huge amounts of data was an essential factor leading to the
broad definition of intelligence that was fostered by the National
Security Agency and its godfather, the National Security Council.
Computer research was supported by NSA in a major way by secret research
dollars. Thomas C. Reed, Director of the Pentagon's Telecommunications,
Command and Control System, referring to domestic intercity telephone
microwave radio trunks, said in 1975, "Modern computer techniques make
it possible to sort through that traffic and find target conversations
easily."
p126-127: Since the wiretap law barred the Bureau of Narcotics and
Dangerous Drugs from installing a tap on New York City's Grand Central
Station pay phones, bureau head John Ingersoll asked the NSA for help.
Within a few months the spy agency was sorting through all the
conversations it was already acquiring for general intelligence
purposes.
Of course, the technicians were required to acquire, monitor, and
discard a large number of calls made by people with no connection
with the cocaine business in South American cities.
But so pleased was Mr. Ingersoll with the tips he was getting from the
dragnet monitoring that he ultimately persuaded the NSA to monitor
simultaneously nineteen other U.S. communication hubs.
]
- “Project L.U.C.I.D.”, continued…
- Fort Meade is the hub of an information gathering octopus whose tentacles
- reach out to the four corners of the earth.
- The principal means of communicating this information is by the National
- Aeronautical and Space Administration (NASA) satellite communications
- system, which most people erroneously think exists primarily for the
- space program.
- It does not.
- The satellites, indeed NASA and the entire American Space Program, exist
- largely to supply the NSA with its telecommunications system. That is why
- the bulk of its operations are officially declared ‘secret’. This
- ultimate ‘Big Brother’ machine even has an official name ‘Project
- Platform’.
[
“The Puzzle Palace”: all these computer systems are linked together
under Project Platform. The first Cray went to the NSA. p138
]
- Although the NSA was officially formed in 1952, it grew out of an
- International Agreement signed in 1947. Officially termed the “UKUSA
- PACT,” this was an agreement between Britain, the U.S.A., Canada, New
- Zealand, Australia and the NATO countries.
- The UKUSA PACT was, quite simply and bluntly, an agreement between these
- countries to collect and collate information on their respective citizens
- and to share this information with each other and pass on to Fort Meade.
- On March 9th 1977, the Leader of the Opposition, Mr. Bill Hayden, asked
- “questions on notice” on the subject. On April 19, Prime Minister Malcom
- Fraser, declined to answer the questions, “in the interests of national
- security.”
- The first clue of the Australian Headquarters of PROJECT PLATFORM appeared
- in 1975. Then, as today, government undertakings involving expenditure
- over a certain amount must be presented to a Senate body, the Joint
- Parliamentary Accounts Committee (JPAC). In 1975 JPAC was asked to
- examine and approve finance for the construction of a new building in
- Deakin, a leafy suburb of Canberra.
- This quite massive building was to be constructed behind an existing, much
- smaller one, which, until then, had been known to the public only as the
- “Deakin Telephone Exchange.”
- That it was not, and never had been, simply a “telephone exchange” finally
- came to light in the 1975 JPAC Approval Report, when it admitted that the
- existing building had a comprehensive basement which housed NASA’s micro-
- wave communications headquarters in Australia. Part of the justification
- of the “need” for the new, much larger building, was that by 1980, it was
- expected that NASA would run out of room in their existing home.
- Apart from NASA, it is now admitted that Deakin houses the National
- Computer Headquarters for, amongst others, the Australian Defense
- Department, the Australian Taxation Office, the Department of Social
- Security, the Commonwealth Department of Education, and the Department
- of Transport and Communications.
- Both Tax and Social Security are, in turn, directly linked to Medicare.
- In fact, the Department of Health used Social Security’s computer
- facilities there until their own were completed.
- A small, but highly significant, part of the building is, in fact,
- occupied by Telecom. This is the part that contains the networking
- junctions for the optical-fiber lines leased by the banks for their
- “Electronic Funds Transfer System” (EFTS). ALL financial transactions
- for the banks pass through there via subsidiary company, “Funds
- Transfers Services Pty Ltd.” (FTS)
- The New York Times INTERNATIONAL Wednesday, May 21, 1997
- by Clyde H. Farnsworth, Woomera, Australia.
- As Darth Vader’s Death Star is blown to bits in the newly remastered “Star
- Wars” at the local theater, the audience of Australian and American Air
- Force personnel, and squadrons of their children, lets out a whoop. As the
- lights go on, everyone is beaming.
[snip]
- Pine Gap employs nearly 1,000 people, mainly from the CIA and the U.S.
National Reconnaissance Office.
- It is the ground station for a U.S. satellite network that intercepts
telephone, radio, data links and other communications around the world.
Worldwide telephone interception.
New Zealand: Unhappy Campers
--- ------- ------- -------
You’d be unhappy too if French terrorists – er – French intelligence agency
operatives sank a ship (GreenPeace!) on the shores of your country, and the
USA controlled ECHELON system failed to warn you.
Here comes the usual – GROAN: “the usual” –
PLUS a description of the basic mechanisms.
Spy tools, come ‘n’ get yer spy tools…a comprehensive look at ECHELON
DICTIONARY. A look at the Beast in your phone. This is the big one.
In the section after this, ‘On Monitoring’, I give detailed examples of
the capability of ECHELON DICTIONARY to seek out information from noise.
To pick out conversations from a massive dragnet. I even give the keyword
monitoring logic for spotting conversations of people actively searching
to leave their current job for another employer. First read this section.
*** “Secret Power” by Nicky Hager, 1996, ISBN 0-908802-35-8
GCSB is New Zealand’s Government Communications Security Bureau.
P8-9
It was with some apprehension that I learned Nicky Hager was researching the
activity of our intelligence community. He has long been a pain in the
establishment’s neck.
There are many things in the book with which I am familiar. I couldn’t tell
him which was which. Nor can I tell you.
But it is an outrage that I and other ministers were told so little [yea NSA]
and this raises the question of to whom those concerned saw themselves
ultimately responsible.
David Lange
Prime Minister of New Zealand 1984-89
P9
Another aspect of the Second World War that carried over into the Cold War
era was the close co-operation between five countries – the United States,
the United Kingdom, Canada, Australia and New Zealand – formalized with the
UKUSA Security Agreement of 1948.
Although the treaty has never been made public, it has become clear that it
provided not only for a division of collecting tasks and sharing of the
product, but for common guidelines for the classification and protection
of the intelligence collected as well as for personnel security.
P20
New Zealand Prime Minister Robert Muldoon, on June 12 1984, admitted the GCSB
liaised closely with Australia, Canada, the United Kingdom and the United
States – the closest the government has ever come to talking about the secret
five-nation signals intelligence alliance of which the GCSB is part.
P108
The New Zealand analysts have a high level of contact with the overseas
agencies, including overseas staff training, postings and exchanges. In
the early 1990s the GCSB began conducting its own training courses, teaching
them the special procedures and regulations governing the production of
signals intelligence reports for the UKUSA network.
It is at these courses where the analysts are told about the UKUSA agreement,
which is described by senior staff as the ‘foundation stone’ of all the
arrangements with the ‘partner’ agencies.
P110 The GCSB introduces the new trainees to the world of codebreaking by
advising them to read two of the greatest exposes of signals intelligence:
James Bamford’s ‘The Puzzle Palace’ and David Kahn’s ‘The Code Breakers’.
P22
In 1984, Glen Singleton of the NSA was formally appointed GCSB’s Deputy
Director of Policy and Plans. Having an American inside the GCSB serving as
a foreign liaison officer would be one thing: allowing an officer from another
country to direct policy and planning seems extraordinary.
[ Unless you think of the NSA as the New World Order. ]
P28-29
Intelsat 7s can carry 90,000 individual phone or fax circuits at once. All
‘written’ messages are currently exploited by the GCSB. The other UKUSA
agencies monitor phone calls as well.
The key to interception of satellite communications is powerful computers that
search through these masses of messages for ones of interest.
The intercept stations take in millions of messages intended for the
legitimate earth stations served by the satellite and then use computers
to search for pre-programmed addresses and keywords.
In this way they select out manageable numbers (hundreds or thousands) of
messages to be searched through and read by the intelligence analysis staff.
Many people are vaguely aware that a lot of spying occurs, maybe even on them,
but how do we judge if it is ubiquitous or not a worry at all? Is someone
listening every time we pick up the telephone? Are all Internet or fax
messages being pored over continuously by shadowy figures somewhere in a
windowless building? There is almost never any solid information with which
to judge what is realistic concern and what is silly paranoia.
What follows explains as precisely as possible – and for the first time in
public – how the worldwide system works, just how immense and powerful it is
and what it can and cannot do. The electronic spies are not ubiquitous, but
the paranoia is not unfounded.
The global system has a highly secret codename – ECHELON.
The intelligence agencies will be shocked to see it named and described for
the first time in print.
Each station in the ECHELON network has computers that automatically search
through millions of intercepted messages for ones containing pre-programmed
keywords or fax, telex and email addresses. Every word of every message is
automatically searched: they do not need your specific telephone number or
Internet address on the list.
All the different computers in the network are known, within the UKUSA
agencies, as the ECHELON Dictionaries.
Computers that can search for keywords have existed since at least the 1970s,
but the ECHELON system has been designed to interconnect all these computers
and allow the stations to function as components of an integrated whole.
Under the ECHELON system, a particular station’s Dictionary computers contain
not only its parent agency’s chosen keywords, but also a list for each of the
other four agencies. For example, each New Zealand site has separate search
lists for the NSA, GCHQ [British], DSD [Australia], and CSE [Canada] in
addition to its own.
So each station collects all the telephone calls, faxes, telexes, Internet
messages and other electronic communications that its computers have been
pre-programmed to select for all the allies and automatically send this
intelligence to them.
This means that New Zealand stations are being used by the overseas agencies
for their automatic collecting – while New Zealand does not even know what
is being intercepted from the New Zealand sites for the allies. In return,
New Zealand gets tightly controlled access to a few parts of the system.
The GCSB computers, the stations, the headquarter operations and, indeed,
GCSB itself function almost entirely as components of this integrated system.
Each station in the network – not just the satellite stations – has Dictionary
computers that report to the ECHELON system
P37
United States spy satellites, designed to intercept communications from orbit
above the earth, are also likely to be connected into the ECHELON system.
These satellites either move in orbits that criss-cross the earth or, like
the Intelsats, sit above the Equator in geostationary orbit.
They have antennae that can scoop up very large quantities of radio
communications from the areas below.
A final element of the ECHELON system are facilities that tap directly into
land-based telecommunications systems, completing a near total coverage of
the world’s communications.
The microwave networks are made up of chains of microwave towers relaying
messages from hilltop to hilltop (always within line of sight) across the
countryside. These networks shunt large quantities of communications across
a country. Intercepting them gives access to international underseas
communications (once they surface) and to international communication trunk
lines across continents.
They are also an obvious target for large-scale interception of domestic
communications. Of course, when the microwave route is across one of the
UKUSA countries’ territory it is much easier to arrange interception.
P41
The ECHELON system has created an awesome spying capacity for the United
States, allowing it to monitor continuously most of the world’s communications.
It is an important component of its power and influence in the post-Cold War
world order, and advances in computer processing technology continue to
increase this capacity.
The NSA pushed for the creation of this system and has the supreme position
within it. It has subsidized the allies by providing the sophisticated
computer programs used in the system, it undertakes the bulk of the
interception operations and, in return, it can be assumed to have full
access to the allies’ capabilities.
On December 2 1987, when Prime Minister David Lange announced plans to build
a new spy station, he issued a press statement explaining that the station
would provide greater independence in intelligence matters: “For years there
has been concern about our dependence on others and all that implies. This
government is committed to standing on its own two feet.”
Lange believed the statement. Even as Prime Minister, no one had told him
about the ECHELON Dictionary system and the way the new station would fit in.
P43
His first experience of the UKUSA alliance was its security ‘indoctrination’
(they really use this word). The indoctrination was done by GCSB security
officer Don Allan, and consisted of a strict lecture about never, for the
rest of his life, talking about his job with anyone except other indoctrinated
people. GCSB workers are forbidden to say anything about their work, even to
their partners.
The indoctrination concluded with Holmes signing the two page indoctrination
form, which refers to New Zealand laws for punishing infringements (in the
Crimes Act) but which originates primarily in UKUSA regulations. Equivalent
forms must be signed by staff throughout the UKUSA alliance.
P44-
In the middle of 1994 Holmes got his first overseas posting – and a
prestigious one at that. He is on a three-year posting to the center of
the UKUSA alliance, the enormous NSA headquarters at Fort George G. Meade.
This posting was the first ever by a GCSB analyst to the NSA. Before he
left New Zealand his daily work, like that of all analysts, revolved entirely
around that most striking manifestation of GCSB’s links with the NSA: the
ECHELON Dictionary system.
Each morning the signals intelligence analysts in New Zealand log on at their
computer terminals and enter the Dictionary system, just as their equivalents
do in the United States, the United Kingdom, Canada and Australia.
What follows is a precise description of how the system works, the first time
it has been publicly described. [Buy the book for full details]
After entering their security passwords, the analysts reach a directory that
lists the different categories of intercept available, each with a four digit
code; 4066, for instance, might be Russian fishing trawlers, 5535 Japanese
diplomatic traffic in the South Pacific, 4959 communications from South
Pacific countries and so on.
They type in the code for the category they want to use first that day.
As soon as they make a selection, a ‘search result’ appears, stating the
number of documents which have been found fitting that category.
The day’s work begins, reading through screen after screen of intercepted
messages.
If a message appears worth reporting on, the analyst can select it from the
rest and work on it out of the Dictionary system.
He or she then translates the message – either in its entirety or as a
summary called a ‘gist’ – and writes it into the standard format of all
intelligence reports produced anywhere within the UKUSA network.
This is the ‘front end’ of the Dictionary system, using a commercially
available program (called BRS Search). It extracts the different categories
of intercepted messages (known just as ‘intercept’) from the large GCSB
computer database of intercept from the New Zealand stations and overseas
agencies.
[ I interrupt this book excerpt to bring you retrieval results for
“BRS Search” from the www.altavista.digital.com search engine:
BRS/Search is designed to manage large collections
of unstructured information, allowing multiple
users to quickly and efficiently search, retrieve
and analyze stored documents simply by entering a
word, concept, phrase, or combination of phrases,
in any length. The product offers the most
powerful indexing structure available today, with
users able to pinpoint critical information in
seconds, even across millions of documents in
numerous databases.
Hmmm. Sounds like the search engine I just used.
You give the search engine keywords to search for, and can specify
exclusion logic keywords. e.g. “digital AND NOT watch”
]
Before anything goes into the database, the actual searching and selection of
intercepted messages has already occurred – in the Dictionary computers at
the New Zealand and overseas stations.
This is an enormous mass of material – literally all the business, government
and personal messages that the station catches.
The computers automatically search through everything as it arrives at the
station.
This is the work of the Dictionary program.
It reads every word and number in every single incoming message and picks out
all the ones containing target keywords and numbers.
Thousands of simultaneous messages are read in ‘real time’ as they pour into
the station, hour after hour, day after day, as the computer finds
intelligence needles in the telecommunications haystack.
Telephone calls containing keywords are automatically extracted from the
masses of other calls and digitally recorded to be listened to by analysts
back in the agency headquarters.
The implications of this capability are immense.
The UKUSA agencies can use machines to search through all the telephone calls
in the world, just as they do for written messages.
It has nothing to do with whether someone is deliberately tapping your phone,
simply whether you say a keyword or combination of keywords that is of
interest to one of the UKUSA agencies.
P47
The keywords include such things as names of people, ships, organizations,
countries and subjects. They also include the known telex and phone numbers
and Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.
The agencies also specify combinations of these keywords to help sift out
communications of interest.
For example, they might search for diplomatic cables containing both the
words ‘Suva’ and ‘aid’, or cables containing the word ‘Suva’ but NOT the
word ‘consul’ (to avoid the masses of routine consular communications).
It is these sets of words and numbers (and combinations of them), under a
particular category, that are placed in the Dictionary computers.
The whole system was developed by the NSA.
P51-
The only known public reference to the ECHELON system was made in relation to
the Menwith Hill station. In July 1988, a United States newspaper, the
Cleveland Plain Dealer, published a story about electronic monitoring of
phone calls of a Republican senator, Strom Thurmond. The alleged monitoring
occurred at Menwith Hill.
Margaret Newsham worked at Menwith Hill as a contract employee of Lockheed
Space and Missiles Corporation. She is said to have told congress staff that,
while at Menwith, she was able to listen through earphones to telephone calls
being monitored.
When investigators subpoenaed witnesses and sought access to plans and manuals
for the ECHELON system, they found there were no formal controls over who
could be targeted; junior staff were able to feed in target names to be
searched for by the computers without any check of their authorization to
do so.
None of this is surprising and it is likely to be insignificant compared with
official abuse of the system.
The capabilities of the ECHELON system are so great, and the secrecy
surrounding it makes it so impervious to democratic oversite, that the
temptation to use it for questionable projects seems irresistible.
In June 1992 a group of current ‘highly placed intelligence operatives’ from
the British GCHQ spoke to the paper Observer: ‘We feel we can no longer remain
silent regarding that which we regard to be gross malpractice and negligence
within the establishment in which we operate.’
They gave as examples GCHQ interception of three charitable organizations,
including Amnesty International and Christian Aid. As the Observer reported:
"At any time GCHQ is able to home in on their communications for a
routine target request," the GCHQ source said. In this case of phone
taps the procedure is known as Mantis. With the telexes this is
called Mayfly. By keying in a code relating to Third World aid, the
source was able to demonstrate telex 'fixes' on the three organizations.
We can then sift through those communications further by selecting
keywords to search for.
Without actually naming it, this was a fairly precise description of how
the ECHELON Dictionary system works.
Note that it was being used for telephone calls.
Again, what was not revealed in the publicity was that this is a UKUSA-wide
system. The design of the ECHELON system means that the interception of
these organizations could have occurred anywhere in the network, at any
station where the GCHQ had requested that the four digit code covering the
necessary keywords and exclusion logic for Third World aid be placed.
P54
In a further misuse of ECHELON, a former intelligence employee revealed that
Prime Minister Margaret Thatcher had personally ordered interception of the
Lonrho company, owners of the Observer newspaper, after that newspaper
published a series of articles in 1989 exposing events surrounding a multi-
billion dollar British arms deal with Saudi Arabia.
The newspaper said the deal had been pushed strongly by Mrs. Thatcher, and
it was alleged that massive bribes were made to middlemen, including her
son, Mark, who was said to have received a 10 million Pound commission.
The former employee of the British Joint Intelligence Committee, Robin
Robison, broke his indoctrination oaths and told the Observer that, as
part of his job, which involved sorting intelligence reports from the
British intelligence agencies, he personally forwarded GCHQ transcripts
of intercepted communications about Lonrho to Mrs. Thatcher’s office.
P9
Intelligence is not just neutral information; it can be powerful and
dangerous. Intelligence gathering and military force are two sides of
the same coin. Both are used by countries and groups within countries to
advance their interests, often at the expense of others. To influence or
defeat an opponent, knowledge can be more useful than military force.
The type of intelligence described in this book, signals intelligence
(SIGINT), is the largest, most secret and most expensive source of secret
intelligence in the world today.
P-5655
Like the British examples, and Mike Frost’s Canadian examples, these stories
will only be the tip of the iceberg.
There is no evidence of a UKUSA code of ethics or a tradition of respect
for Parliament or civil liberties in their home countries.
The opposite seems to be true: that anything goes as long as you do not
get caught. Secrecy not only permits but encourages questionable operations.
Three observations need to be made about the immense spying capability
provided by the ECHELON system.
The first is that the magnitude of the global network is a product of
decades of intense Cold War activity. Yet with the end of the Cold War
it has not been demobilized and budgets have not been significantly cut.
Indeed the network has grown in power and reach. Yet the public
justifications, for example that ‘economic intelligence is now more
important’, do not even begin to explain why this huge spy system
should be maintained. In the early 1980s the Cold War rhetoric was
extreme and global war was seriously discussed and planned for.
In the 1990s, the threat of global war has all but disappeared and
none of the allies faces the remotest serious military threat.
The second point about the ECHELON capabilities is that large parts of the
system, while hiding behind the Cold War for their justification, were
never primarily about the Cold War at all.
The UKUSA alliance did mount massive operations against the Soviet Union
and other ‘communists’, but other elements of the worldwide system, such
as the interception of Intelsat communications, microwave networks and
many regional satellites, were not aimed primarily at the Russians, the
Iraqis or the North Koreans.
Then, and now, they are targeting groups which do not pose any physical
threat to the UKUSA allies at all.
But they are ideal to use against political opponents, economic competitors,
countries where the allies may want to gain some advantage (especially
access to cheap resources) and administrations (like Nicaragua’s Sandinista
government) which do not fit an American-dominated world order.
The third observation is that telecommunications organizations – including
the telephone companies – are not blameless in all of this.
These companies, to which people pay their monthly bills believing that
the phone calls they make and the faxes they send are secure, should well
be aware of the wholesale interception of ‘private’ communications that
has been occurring for decades.
Yet they neither invest in encryption technology nor insist that organizations
such as the Washington-based Intelsat Corporation provide encryption.
They do not let their customers know that their international communications
are open to continuous interception. Wittingly or unwittingly, this lack of
action assists large-scale spying against the individuals, businesses and
government and private organizations that innocently entrust their
communications to these companies.
ECHELON is a staggeringly comprehensive and highly secret global spying
system. Around the world there are networks of spy stations and spy
satellites which can intercept communications anywhere on the planet.
P18
Over the last 10 years a lot has been heard in New Zealand about the dangers
of ‘bureaucratic capture’, about senior officials controlling their ministers
rather than the other way around. The area of government activity described
in this book is the ultimate example of bureaucratic capture.
Politicians, whom the public has presumed will be monitoring the intelligence
organizations on their behalf, have been systematically denied the information
required to do that job.
If a democratic society wants to control its secret agencies, it is essential
that the public and politicians have the information and the will to do so.
P113
Good encryption systems, such as PGP, developed privately by American Phil
Zimmerman, are publicly available, although they are still used only by
relatively few people in the know.
The UKUSA agencies have been attempting to curb the spread of this technology,
which is a major threat to their influence, so far without enough success to
stop it.
It remains to be seen how much the public can find a technological answer to
maintaining privacy in a world with systems like ECHELON.
*** end of ‘Secret Power’ excerpt
Throughout the Cold War, the United States government pounded into us again
and again how Russia and China were evil because they monitored and controlled
the political expression of their people, had sham laws and sham courts, all
dedicated to maintaining the power of the all-important State.
How the philosophy of communism was the rights of the individual were
subservient to the needs of the State, as determined by the State.
i.e. the antithesis of constitutional democracy
Ironically, it was the United States that built
the ultimate Orwellian surveillance mechanism.
There was no public discussion about it.
And used sham laws: Executive Orders and Congressional legislation.
To create a secret agency and a secret sham court.
Used repeatedly to control lawful domestic political protest.
The Soviet Union and China we were told to fear.