ECHELON SYSTEM

Ric V. Carvalho gandalf at waverly.net
Mon Aug 17 21:13:54 PDT 1998


Thought you all might be interested in seeing this.
-R

http://www.villagevoice.com/ink/news/33vest.shtml


Listening In

Suppose, this past weekend, you sent an e-mail to a friend overseas.=20
There's a reasonable possibility your communication was intercepted by a
global surveillance system--especially if you happened to discuss last
week's bombings in East Africa.=20

Or suppose you're stuck in traffic and in your road rage you whip out a
cell phone and angrily call your congressman's office in Washington.=20
There's a chance the government is listening in on that conversation, too
(but only for the purposes of "training" new eavesdroppers).=20

Or suppose you're on a foreign trip--vacation, business, relief work--and
you send off a fax to some folks that Washington doesn't view too keenly.
Your message could be taken down and analyzed by the very same system.=20

That system is called ECHELON and it is controlled by the U.S. National
Security Agency (NSA). In America, it is the Intelligence Network That
Dare Not Be Acknowledged. Questions about it at Defense Department
briefings are deftly deflected.  Requests for information about it under
the Freedom of Information Act linger in bureaucratic limbo.  Researchers
who mention possible uses of it in the presence of intelligence officials
are castigated. Members of Congress--theoretically, the people's
representatives who provide oversight of the intelligence
community--betray no interest in helping anyone find out anything about
it. Media outlets (save the award-winning but low-circulation Covert
Action Quarterly) ignore it.  In the official view of the U.S.=20
Government, it doesn't exist.=20

But according to current and former intelligence officials, espionage
scholars, Australian and British investigative reporters, and a dogged Ne=
w
Zealand researcher, it is all too real. Indeed, a soon-to-be finalized
European Parliament report on ECHELON has created quite a stir on the
other side of the Atlantic.  The report's revelations are so serious that
it strongly recommends an intensive investigation of NSA operations.=20

The facts drawn out by these sources reveal ECHELON as a powerful
electronic net--a net that snags from the millions of phone, fax, and
modem signals traversing the globe at any moment selected communications
of interest to a five-nation intelligence alliance.  Once intercepted
(based on the use of key words in exchanges), those communiqu=E9s are sen=
t
in real time to a central computer system run by the NSA; round-the-clock
shifts of American, British, Australian, Canadian, and New Zealand
analysts pour over them in search of . . .  what?=20

Originally a Cold War tool aimed at the Soviets, ECHELON has been
redirected at civilian targetsworldwide. In fact, as the European
Parliament report noted, political advocacy groups like Amnesty
International and Greenpeace were amongst ECHELON's targets. The system's
awesome potential (and potential for abuse) has spurred some traditional
watchdogs to delve deep in search of its secrets, and even prompted some
of its minders within the intelligence community to come forward. "In som=
e
ways," says Reg Whittaker, a professor and intelligence scholar at
Canada's York University, "it's probably the most useful means of getting
at the Cold War intelligence-sharing relationship that still continues."=20

While the Central Intelligence Agency--responsible for covert operations
and human-gathered intelligence, or HUMINT--is the spy agency most people
think of, the NSA is, in many respects, the more powerful and important o=
f
the U.S.  intelligence organizations. Though its most egregious excesses
of 20 years ago are believed to have been curbed, in addition to
monitoring all foreign communications, it still has the legal authority t=
o
intercept any communication that begins or ends in the U.S., as well as
use American citizens' private communications as fodder for trainee spies.
Charged with the gathering of signals intelligence, or SIGINT--which
encompasses all electronic communications transmissions--the NSA is
larger, better funded, and infinitely more secretive than the CIA. Indeed=
,
the key document that articulates its international role has never seen
the light of day.=20

That document, known as the UKUSA Agreement, forged an alliance in 1948
among five countries--the U.S., Britain, Australia, Canada, and New
Zealand--to geographically divvy up SIGINT-gathering responsibilities,
with the U.S. as director and main underwriter. Like the NSA--hardly know=
n
until the Pike and Church congressional investigations of the '70s--the
other four countries' SIGINT agencies remain largely unknown and
practically free of public oversight. While other member nations conduct
their own operations, there has "never been any misunderstanding that
we're NSA subsidiaries," according to Mike Frost, an ex-officer in
Canada's SIGINT service, the Communications Security Establishment (CSE).=
=20
Moreover, all the signatory countries have NSA listening posts within
their borders that operate with little or no input from the local agency.=
=20

[snip... please see URL for rest of article.]

-o-
Subscribe: mail majordomo at sekurity.org with "subscribe isn".
Today's ISN Sponsor: New Dimensions International [www.newdimensions.net]
----------------------------------------------------------------------
Reply From: Simon Johnson <simon.johnson at shake.net>

Hello All,

For those that are interested in Echelon. (oops I've said the "E" word) I
would recommend the following book:

Title: Secret Power - "New Zealand's Role In The International Spy Network"
Author: Nicky Hager
Publisher: Craig Potton Publishing
ISBN: 0-908802-35-8

It was this book that made the Echelon system public knowledge.

Press Release:

http://www.fas.org/irp/eprint/sp/sp_p.htm

More Information:

http://www.hamradio-online.com/1996/dec/echelon.html
http://www.saar.de/~bong/archiv/echelon.html


Hope all this helps.


Best regards,

Simon Johnson
Technical Director
Shake Communications
Experts in Internet and Information Security
http://www.shake.net
-------------------------MESSAGE SEPARATOR-----------------------------
Don't be alarmed, this is only bait for eavesdropping government computers
at NSA Inc., CIA Inc. and FBI Inc. Pirates, Privateers and Brigands that
they are!!!!
Their computers are keyed to trigger on such words and copy the suspect
communications to their system.  If enough people would do this, we could
bog their system down and thus hopefully prove to them how fruitless and
immoral this whole thing is.

Your right to privacy in personal communications does matter!  Do something
about it!

EXPLOSIVES,GUNS,ASSASSINATION, CONSPIRACY, PRIMERS, DETONATORS, INITIATORS,
MAIN CHARGE, NUCLEAR CHARGES, AMBUSH, SNIPING, MOTORCADE,IRS, BATF, JTF-6,
MJTF, HRT, SRT, HOSTAGES, MUNITIONS, WEAPONS, TNT, RDX, AMFO, HMTD, PICRIC
ACID, SILVER NITRITE, MERCURY FULMINATE, PRESIDENTIAL MOTORCADE, SALT
PETER, CHARCOAL, SULPHER, C4, COMPOSITION B, AMATOL, PETN, LEAD AZIDE, LEAD
STYPHANTE, DDNP, TETRYL, NITROCELLULOSE, NITROSTARCH, MINES, GRENADES,
ROCKETS, FUSES, DELAY MECHANISM, MORTARS, RPG7, PROPELLANTS, INCINDIARIES,
INCINDIARY DEVICE, THERMITE, SECURITY FORCES, INTELLIGENCE, AGENCIES,HRT,
RESISITANCE, PSYOPS, INFILTRATION, ASSAULT TEAM, DEFENSIVE ELEMENTS,
EVASION, DETECTION, MISSION, COMMUNICATIONS,  THE FOOTBALL, PLATTER CHARGE,
SHAPED CHARGES, M118, CLAYMORE, BODY ARMOR, CHARGES, SHRAPNEL, TIMERS,
TIMING DEVICES, BOOBYTRAPS, DETCORD, PMK 40, SILENCERS, UZI, HK-MP5, AK-47,
FAL, JATTI,  SKORPION MP, TEFLON BULLETS, CORDITE, NAPALM, LAW, STINGERS,
RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, AIR FORCE
ONE,  M60, RPK74, SG530, SG540, GALIL ARM, WALTHER WA2000, HK33KE,
PARKER-HALE MOD. 82, AKR, INGRAM MAC10, M3, L34A1, WALTHER MPL,, AKS-74,
HK-GR6, SUBSONIC ROUNDS, BALLISTIC MEDIA,  SPECIAL FORCES, JFKSWC, SFOD-D,
SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI,
Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya,
Terrorism Defensive Information, Defense Information Warfare, Offensive
Information, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON
ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec,
JICS, Computer Terrorism, Firewalls, Secure Internet Connections,
RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS,
Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert
Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly,
PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL,
AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS,
DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET,
ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN,
877, NAVELEXSYSSECENGCEN, BZ,
CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA,
JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?,
SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB,
MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS,
STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military
Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba,
Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA,
NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign,
Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce,
Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID,
BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL,
NAVWCWPNS, NSWC, USAFA, AHPCRC,
ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE,
SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE,
SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA,
SHAPE, bird dog, SACLANT, BECCA,
DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS,
868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC,
EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV,
Masuda, Forte, AT, GIGN, Exon Shell, radint, MB,
CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE,
STEP, Echelon, Dictionary, MD2, MD4, MDA,
diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X,
Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS,
Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11,
SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA,
DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT,
RFI, ZL31, SIGDASYS, TDM. SUKLO,
SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, SIGS, VHF, Recon, peapod,
PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF,
SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200,
15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14,
enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD,
Counter Terrorism Security, SARA, Rapid Reaction, JSOFC3IP,
Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security
Consulting, M-x spook, Z-150T, High Security, Security Evaluation,
Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies,
IWO, eavesdropping, debugging, CCSS, interception, COCOT,
NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,
Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc,
2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere,
Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson,
Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, quarter, Cornflower,
Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell,
B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF,
POCSAG, rusers, Covert Video, Intiso, r00t, lock picking,
Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF,
Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash,
ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,
stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE,
Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable &
Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax
encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger,
buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg,
50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh
Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD,
TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS,
Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF,
127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME,
JTF-6,, AVN, , ISSSP, Anonymous, W, Sex,
chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens,
unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA,
sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA,
DT, gtegsc, nowhere, .ch, hope, emc, industrial espionage, SUPIR,
PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett
Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram
Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS,
Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts,
Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker,
Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint,
GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole,
SAR, Rand Corporation, Starr, Wackenhutt, EO,
burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale,
IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC,
CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura,
Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet
Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA,
Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition,
cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, spook,
keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World
News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish,
Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned,
Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash,
zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN,
MCI, Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400,
Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk,
supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite
phones, IWIS, Planet-1, ISTA, rs9512c, South Africa, Sergeyev,
Montenegro, Toeffler, Rebollo, sorot, cryptanalysis, nuclear, 52 52 N - 03
03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI,
Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS,
WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51,
SABC, basement, ISWG, $@, data-haven, NSDD, black-bag, rack, TEMPEST,
Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego,
ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly,
Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,
gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon,
snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega,
Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt,
Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS,
3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD,
1984, blow out, BUDS, WQC, Flintlock, PABX, Electron,
Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL,
K3, Visa/BCC, SNT, Ceridian, STE, condor,
CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,
Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim,
NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash,
NAWAS, government, NSY, hate, speedbump, joe,
illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax, Gulf,
lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani,
Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon
VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $,
imapct, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assasinate,
virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997,
Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike,
WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2.,
PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar,
IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton,
Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP,
^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF,
Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP,
SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE,
FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon,
SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA,
HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG,
chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering,
CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST,
MITI, JERTO, SDF, Koancho, Blenheim, Rivera,
Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN,
ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &,
Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS,
AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS,
cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD,
package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen,
LBSD, van, schloss, secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4,
Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU,
Threat, JPL, Tess, SE, EPL, SPINTCOM, ISS-ADP, Merv, Mexico, SUR, SO13,
Rojdykarna, airframe, 510, EuroFed, Avi, shelter, Crypto AG,
----------------------------------------------------------------------
A Democracy: Three wolves and a sheep voting on dinner.
A Republic: The flock gets to vote for which wolves vote on dinner.
A Constitutional Republic:  Voting on dinner is expressly forbidden, and the
sheep are armed.
Federal Government: The means by which the sheep will be fooled into voting
for a Democracy...








More information about the cypherpunks-legacy mailing list