Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
~United States Constitution, Amendment IV
“He who controls the past controls the future. He who controls the present controls the past.”
“Now I will tell you the answer to my question. It is this. The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power, pure power. What pure power means you will understand presently. We are different from the oligarchies of the past in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just around the corner there lay a paradise where human beings would be free and equal. We are not like that. We know what no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power. Now you begin to understand me.”
“Big Brother is Watching You.”
~George Orwell’s 1984
POWER IS NOT A MEANS, IT IS AN END
Maxine Waters Confirms Big Brother Database 2013 Foretells NSA Phone & Internet Spying
Glenn Beck:Govt Storing Citizen Cellphone& Internet Activity
Digital Blackwater: How the NSA Gives Private Contractors Control of the Surveillance State
Glenn Greenwald on How NSA Leaker Edward Snowden Helped Expose a “Massive Surveillance Apparatus”
“A Massive Surveillance State”: Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails
He told you so: Bill Binney talks NSA leaks
What You Should Know About The New NSA Utah Data Center
Is Edward Snowden a Hero? A Debate With Journalist Chris Hedges & Law Scholar Geoffrey Stone
Spying On Americans By NSA Prism Collection Details – Rand Paul On Hannity
NSA is Spying on EVERYTHING you do. Phone calls and internet activity is being stored and monitored.
PRISM: Why the NSA is Mining Internet Data
Total Surveillance : N.S.A. data mining all computers, phone calls, internet, emails
CNET Update – Uproar over PRISM government surveillance
NSA Caught Spying on Americans’ Internet Use
Columnist exposes Obama surveillance
Meet Edward Snowden: NSA PRISM Whistleblower
Sky News interview w/ Julian Assange and JP Barlow RE: Prism and Edward Snowden
Complete News – Snowden leaks show NSA ‘routinely lies’ to Congress
Judge Napolitano On NSA Spying: Most Extraordinarily Broad Search Warrant Ever Issued In US History
Rand Paul Discusses The NSA’s Violation Of The Bill Of Rights On Yahoo News (6-6-13)
Rand Paul On NSA Spying: ‘I’m Going To Challenge This At The Supreme Court’ -
Ron Paul: NSA Seizing Phone Records Symptom of Failure of The State
NSA Constitutional Violations? – Judge Andrew Napolitano – Geraldo
Clever Denials Surrounding the NSA PRISM Piracy Scandal
Peter Eckersley from the Electronic Frontier Foundation stopped by to explain why Silicon Vally’s top tech companies are dancing around PRISM allegations. Interview recorded Friday June 7, 2013
NSA Surveillance – Does Obama Have ANY Credibility Left?
“In his remarks today defending the NSA programs gathering telephone records and mining Internet companies, Obama sounded a familiar refrain, saying he welcomes the “debate” over the proper balance between civil liberties and national security.”*
Obama gave a speech in defense of recently uncovered secret programs to wiretap and data-mine U.S. citizens almost indiscriminately, and Congress agrees. Do you believe his remarks that we NEED these programs? Would Obama agree with himself campaigning about his stance on civil rights? Cenk Uygur, Ben Mankiewicz, and John Iadarola discuss.
*Read more form Washington Post:
“Obama Is BIG BROTHER And He’s A LIAR!”
How PRISM Easily Gives Your Private Data Over to Big Brother
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.
The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.”*
We’ve been assured by the president that the NSA’s PRISM program won’t affect “ordinary” U.S. citizens, but what is the criteria for deciding who gets their data mined and monitored? Cenk Uygur, Ben Mankiewicz, and John Iadarola (Host, TYT University) discuss the egregious reach of the Obama administration’s secret mass surveillance program.
*Read more from The Guardian:
Fourth Amendment Has been Suspended
The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.The surveillance by the National Security Agency, the government’s chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack, though it wouldn’t persistently monitor the whole system, these people said.
Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million, said a person familiar with the project.
An NSA spokeswoman said the agency had no information to provide on the program. A Raytheon spokesman declined to comment.
Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is equipped to provide.
“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security,” said one internal Raytheon email, the text of which was seen by The Wall Street Journal. “Perfect Citizen is Big Brother.”
Glenn Becks “SURVEILLANCE STATE” (Must Viewing)
NSA spying on All Americans Part 1
NSA spying on All Americans Part 2
How to Protect Yourself from The NSA
NSA Whistleblower Seeks Asylum in Iceland
Former CIA Officer: Officials Considering NSA Whistleblower’s Case Potential Chinese Espionage
Judge Jeanine Slams IRS, NSA and Obama for Expanding Surveillance Program – Opening Statement
James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 1 of 2
James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 2 of 2
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower
NSA whistleblower William Binney Keynote at HOPE Number Nine
U.S. v. Whistleblower Tom Drake
Tom Drake, a former NSA senior executive indicted last year for espionage after leaking to the media allegations that the nation’s largest intelligence organization had committed fraud, waste and abuse will appear in his first television interview. Scott Pelley reports.
Whistle Blower Threatened with 35 Years in Prison, Warns of Developing Tyranny
NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Part 2: Former NSA Employee Thomas Drake and Jesselyn Radack on Whistleblower Crackdown
The Police – Every Breath You Take
“When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature’s God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.–That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, –That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security. …”
The Declaration of Independence
Background Articles and Videos
Domestic Spying, Mainstream Source – NSA, Internet Spying, AT&T
Domestic Spying, Mainstream Source – NSA Copying Entire Internet
Glenn Becks “SURVEILLANCE STATE”
Barack Obama’s Surveillance Society
GLENN BECK ‘They Are Liars’
Glenn Greenwald: Challenging the US Surveillance State
2012.05.01 – GBTV – The Glenn Beck Radio Program – NSA Warning
Project Vigilant: Shadowy Spy Group Building Dossiers On Internet Users For Feds – Alex Jones Tv 3/3
Total Information Awareness – Social Networking Sites (mirror)
The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources including, without any requirement for a search warrant. This information would then be analyzed to look for suspicious activities, connections between individuals, and “threats”. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.
Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names.
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued after the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.
A group of former NSA workers — Kirk Wiebe, William Binney, Ed Loomis, and Thomas A. Drake, along with House Intelligence Committee staffer Diane Roark (an expert on the NSA budget) — believed the operational prototype system called ThinThread was a better solution than Trailblazer, which was just a concept on paper at the time. They complained to the DoD Inspector General office in 2002 about mismanagement and the waste of taxpayer money at the NSA surrounding the Trailblazer program. In 2007 the FBI raided the homes of these people, an evolution of President Bush’s crackdown on whistleblowers and “leaks” after the New York Times disclosed a separate program (see NSA warrantless surveillance controversy). In 2010, one of the people who had helped the IG in the ensuing investigation, NSA official Thomas Andrews Drake, was charged with espionage, part of the Obama administration’s crackdown on whistleblowers and “leaks”. The original charges against him were later dropped and he pled to a misdemeanor.
The result of the DoD IG complaint was a 2004 audit report that was released under FOIA in 2011. Although highly redacted, the report contained significant criticisms of Trailblazer, and included some relatively minor criticisms of ThinThread, for example, citing a low “quality of service and support” from the ThinThread program team, a lack of documentation, a lack of a configuration management system, and a lack of a trouble ticket system. However, “The findings that led to the recommendations would not have prevented the successful deployment of THINTHREAD … the recommendations were made to improve the operational efficiency of THINTHREAD after it was deployed …”
The program would have used a technique of encrypting sensitive privacy information in order to comply with legal concerns, and would have automatically identified potential threats. The sources of the data for this program would have included “massive phone and e-mail data,” but the extent of this information is not clear. Only once a threat was discovered, would the data be decrypted for analysis by agents.
ThinThread would have bundled together four cutting-edge surveillance tools.:
- Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.
- Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy.
- Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency.
- Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records.
Intelligence experts describe as rigorous testing of ThinThread in 1998, the project succeeded at each task with high marks. For example, its ability to sort through massive amounts of data to find threat-related communications far surpassed the existing system. It also was able to rapidly separate and encrypt U.S.-related communications to ensure privacy.
The Pentagon report concluded that ThinThread’s ability to sort through data in 2001 was far superior to that of another NSA system in place in 2004, and that the program should be launched and enhanced. ThinThread was designed to address two key challenges: One, the NSA had more information than it could digest, and, two, increasingly its targets were in contact with people in the United States whose calls the agency was prohibited from monitoring.
NSA’s existing system for data-sorting has produced a database clogged with corrupted and useless information. The mass collection of relatively unsorted data, combined with system flaws erroneously flag people as suspect, has produced numerous false leads, draining analyst resources. NSA leads have resulted in numerous dead ends.
NSA dropped the component that monitored for abuse of records. It not only tracked the use of the database, but hunted for the most effective analysis techniques, and some analysts thought it would be used to judge their performance. Within the NSA, the primary advocate for the ThinThread program was Richard Taylor. Taylor has retired from the NSA. The strength of ThinThread’s approach is that by encrypting information on Americans, it is legal regardless of whether the country is at war.
ThinThread “was designed very carefully from a legal point of view, so that even in non-wartime, you could have done it legitimately.”
End of the project
The project was ended after successful testing by General Michael Hayden, and while the privacy elements were not retained, the analysis technology is reported to be the underlying basis of current NSA analysis techniques.
“They basically just disabled the [privacy] safeguards.” [That quote does not appear in the link]
Some anonymous NSA officials told Hosenball of Newsweek that the ThinThread program, like Trailblazer, was a “wasteful failure”.
Drake was interviewed on The Daily Show on August 6, 2012 about his charges and the program with his lawyer.
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation. The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience“.
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens. Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000. SAIC had also hired a former NSA director to its management; Bobby Inman. SAIC also participated in the concept definition phase of Trailblazer.
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” 
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs’” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.” The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars. Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying. A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy. Drake gave info to DoD during its investigation of the matter. Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed. She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative. Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun. Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union. None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917, part of President Barack Obama‘s crackdown on whistleblowers and “leakers”. The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS and Five Eyes). It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.
The system has been reported in a number of public sources. Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001, and by author James Bamford in his books on the National Security Agency of the United States. The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
- the Government Communications Headquarters of the United Kingdom,
- the National Security Agency of the United States,
- the Communications Security Establishment of Canada,
- the Defence Signals Directorate of Australia, and
- the Government Communications Security Bureau of New Zealand.
- the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic. During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication, and could be intercepted at great distances. The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber. The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%. Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video. Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt. A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.” The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK. At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.
The 2001 European Parliamentary (EP) report lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
- Hong Kong (since closed)
- Australian Defence Satellite Communications Station (Geraldton, Western Australia)
- Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)
- Misawa Air Base (Japan) Map
- GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
- Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
- Sugar Grove (West Virginia, U.S.) Map
- Yakima Training Center (Washington, U.S.) Map
- GCSB Waihopai (New Zealand)
- GCSB Tangimoana (New Zealand)
- CFS Leitrim (Ontario, Canada)
- Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
- Ayios Nikolaos (Cyprus – U.K.)
- Bad Aibling Station (Bad Aibling, Germany – U.S.)
- Buckley Air Force Base (Aurora, Colorado)
- Fort Gordon (Georgia, U.S.)
- Gander (Newfoundland & Labrador, Canada)
- Guam (Pacific Ocean, U.S.)
- Kunia (Hawaii, U.S.)
- Lackland Air Force Base, Medina Annex (San Antonio, Texas)