-Caveat Lector-

http://echelononline.free.fr/documents/hager/sp_3.htm

"Secret Power" by Nicky Hager, 1996, ISBN 0-908802-35-8

GCSB is New Zealand's Government Communications Security Bureau.

P8-9

It was with some apprehension that I learned Nicky Hager was researching the
activity of our intelligence community. He has long been a pain  in the
establishment's neck. There are many things in the book with which I am
familiar. I couldn't tell him which was which. Nor can I tell you. But  it
is an outrage that I and other ministers were told so little [yea NSA] and
this raises the question of to whom those concerned saw themselves
ultimately responsible.

David Lange, Prime Minister of New Zealand 1984-89

P9

Another aspect of the Second World War that carried over into the Cold War
era was the close co-operation between five countries - the  United States,
the United Kingdom, Canada, Australia and New Zealand - formalized with the
UKUSA Security Agreement of 1948.

Although the treaty has never been made public, it has become clear that it
provided not only for a division of collecting tasks and sharing of  the
product, but for common guidelines for the classification and protection of
the intelligence collected as well as for personnel security.

P20

New Zealand Prime Minister Robert Muldoon, on June 12 1984, admitted the
GCSB liaised closely with Australia, Canada, the United  Kingdom and the
United States - the closest the government has ever come to talking about
the secret five-nation signals intelligence alliance  of which the GCSB is
part.

P108

The New Zealand analysts have a high level of contact with the overseas
agencies, including overseas staff training, postings and exchanges.  In the
early 1990s the GCSB began conducting its own training courses, teaching
them the special procedures and regulations governing the  production of
signals intelligence reports for the UKUSA network.

It is at these courses where the analysts are told about the UKUSA
agreement, which is described by senior staff as the 'foundation stone' of
all  the arrangements with the 'partner' agencies.

P110

The GCSB introduces the new trainees to the world of codebreaking by
advising them to read two of the greatest exposes of signals  intelligence:
James Bamford's 'The Puzzle Palace' and David Kahn's 'The Code Breakers'.

P22

In 1984, Glen Singleton of the NSA was formally appointed GCSB's Deputy
Director of Policy and Plans. Having an American inside the  GCSB serving as
a foreign liaison officer would be one thing: allowing an officer from
another country to direct policy and planning seems  extraordinary.

[ Unless you think of the NSA as the New World Order. ]

P28-29

Intelsat 7s can carry 90,000 individual phone or fax circuits at once. All
'written' messages are currently exploited by the GCSB. The other  UKUSA
agencies monitor phone calls as well.

The key to interception of satellite communications is powerful computers
that search through these masses of messages for ones of interest.

The intercept stations take in millions of messages intended for the
legitimate earth stations served by the satellite and then use computers to
search for pre-programmed addresses and keywords.

In this way they select out manageable numbers (hundreds or thousands) of
messages to be searched through and read by the intelligence  analysis
staff.

Many people are vaguely aware that a lot of spying occurs, maybe even on
them, but how do we judge if it is ubiquitous or not a worry at all? Is
someone listening every time we pick up the telephone? Are all Internet or
fax messages being pored over continuously by shadowy figures  somewhere in
a windowless building? There is almost never any solid information with
which to judge what is realistic concern and what is silly  paranoia.

What follows explains as precisely as possible - and for the first time in
public - how the worldwide system works, just how immense and  powerful it
is and what it can and cannot do. The electronic spies are not ubiquitous,
but the paranoia is not unfounded.

The global system has a highly secret codename - ECHELON.

The intelligence agencies will be shocked to see it named and described for
the first time in print.

Each station in the ECHELON network has computers that automatically search
through millions of intercepted messages for ones containing  pre-programmed
keywords or fax, telex and email addresses. Every word of every message is
automatically searched: they do not need your  specific telephone number or
Internet address on the list.

All the different computers in the network are known, within the UKUSA
agencies, as the ECHELON Dictionaries.

Computers that can search for keywords have existed since at least the
1970s, but the ECHELON system has been designed to interconnect  all these
computers and allow the stations to function as components of an integrated
whole.

Under the ECHELON system, a particular station's Dictionary computers
contain not only its parent agency's chosen keywords, but also a list  for
each of the other four agencies. For example, each New Zealand site has
separate search lists for the NSA, GCHQ [British], DSD  [Australia], and CSE
[Canada] in addition to its own.

So each station collects all the telephone calls, faxes, telexes, Internet
messages and other electronic communications that its computers have  been
pre-programmed to select for all the allies and automatically send this
intelligence to them.

This means that New Zealand stations are being used by the overseas agencies
for their automatic collecting - while New Zealand does not  even know what
is being intercepted from the New Zealand sites for the allies. In return,
New Zealand gets tightly controlled access to a few  parts of the system.

The GCSB computers, the stations, the headquarter operations and, indeed,
GCSB itself function almost entirely as components of this  integrated
system.

Each station in the network - not just the satellite stations - has
Dictionary computers that report to the ECHELON system

P37

United States spy satellites, designed to intercept communications from
orbit above the earth, are also likely to be connected into the  ECHELON
system.

These satellites either move in orbits that criss-cross the earth or, like
the Intelsats, sit above the Equator in geostationary orbit.

They have antennae that can scoop up very large quantities of radio
communications from the areas below.

A final element of the ECHELON system are facilities that tap directly into
land-based telecommunications systems, completing a near total  coverage of
the world's communications.

The microwave networks are made up of chains of microwave towers relaying
messages from hilltop to hilltop (always within line of sight)  across the
countryside. These networks shunt large quantities of communications across
a country. Intercepting them gives access to  international underseas
communications (once they surface) and to international communication trunk
lines across continents.

They are also an obvious target for large-scale interception of domestic
communications. Of course, when the microwave route is across one  of the
UKUSA countries' territory it is much easier to arrange interception.

P41

The ECHELON system has created an awesome spying capacity for the United
States, allowing it to monitor continuously most of the world's
communications.

It is an important component of its power and influence in the post-Cold War
world order, and advances in computer processing technology  continue to
increase this capacity.

The NSA pushed for the creation of this system and has the supreme position
within it. It has subsidized the allies by providing the  sophisticated
computer programs used in the system, it undertakes the bulk of the
interception operations and, in return, it can be assumed to  have full
access to the allies' capabilities.

On December 2 1987, when Prime Minister David Lange announced plans to build
a new spy station, he issued a press statement explaining  that the station
would provide greater independence in intelligence matters: "For years there
has been concern about our dependence on  others and all that implies. This
government is committed to standing on its own two feet."

Lange believed the statement. Even as Prime Minister, no one had told him
about the ECHELON Dictionary system and the way the new  station would fit
in.

P43

His first experience of the UKUSA alliance was its security 'indoctrination'
(they really use this word). The indoctrination was done by GCSB  security
officer Don Allan, and consisted of a strict lecture about never, for the
rest of his life, talking about his job with anyone except other
indoctrinated people. GCSB workers are forbidden to say anything about their
work, even to their partners.

The indoctrination concluded with Holmes signing the two page indoctrination
form, which refers to New Zealand laws for punishing  infringements (in the
Crimes Act) but which originates primarily in UKUSA regulations. Equivalent
forms must be signed by staff throughout the  UKUSA alliance.

P44

In the middle of 1994 Holmes got his first overseas posting - and a
prestigious one at that. He is on a three-year posting to the center of the
UKUSA alliance, the enormous NSA headquarters at Fort George G. Meade.

This posting was the first ever by a GCSB analyst to the NSA. Before he left
New Zealand his daily work, like that of all analysts, revolved  entirely
around that most striking manifestation of GCSB's links with the NSA: the
ECHELON Dictionary system.

Each morning the signals intelligence analysts in New Zealand log on at
their computer terminals and enter the Dictionary system, just as their
equivalents do in the United States, the United Kingdom, Canada and
Australia.

What follows is a precise description of how the system works, the first
time it has been publicly described. [Buy the book for full details]

After entering their security passwords, the analysts reach a directory that
lists the different categories of intercept available, each with a four
digit code; 4066, for instance, might be Russian fishing trawlers, 5535
Japanese diplomatic traffic in the South Pacific, 4959 communications  from
South Pacific countries and so on.

They type in the code for the category they want to use first that day.

As soon as they make a selection, a 'search result' appears, stating the
number of documents which have been found fitting that category.

The day's work begins, reading through screen after screen of intercepted
messages.

If a message appears worth reporting on, the analyst can select it from the
rest and work on it out of the Dictionary system.

He or she then translates the message - either in its entirety or as a
summary called a 'gist' - and writes it into the standard format of all
intelligence reports produced anywhere within the UKUSA network.

This is the 'front end' of the Dictionary system, using a commercially
available program (called BRS Search). It extracts the different categories
of intercepted messages (known just as 'intercept') from the large GCSB
computer database of intercept from the New Zealand stations and  overseas
agencies.

[ I interrupt this book excerpt to bring you retrieval results for "BRS
Search" from the www.altavista.digital.com search engine:

BRS/Search is designed to manage large collections of unstructured
information, allowing multiple users to quickly and efficiently search,
retrieve and analyze stored documents simply by entering a word, concept,
phrase, or combination of phrases, in any length. The product  offers the
most powerful indexing structure available today, with users able to
pinpoint critical information in seconds, even across millions of  documents
in numerous databases.

Hmmm. Sounds like the search engine I just used.

You give the search engine keywords to search for, and can specify exclusion
logic keywords. e.g. "digital AND NOT watch"]

Before anything goes into the database, the actual searching and selection
of intercepted messages has already occurred - in the Dictionary  computers
at the New Zealand and overseas stations.

This is an enormous mass of material - literally all the business,
government and personal messages that the station catches.

The computers automatically search through everything as it arrives at the
station.

This is the work of the Dictionary program.

It reads every word and number in every single incoming message and picks
out all the ones containing target keywords and numbers.

Thousands of simultaneous messages are read in 'real time' as they pour into
the station, hour after hour, day after day, as the computer finds
intelligence needles in the telecommunications haystack.

Telephone calls containing keywords are automatically extracted from the
masses of other calls and digitally recorded to be listened to by  analysts
back in the agency headquarters.

The implications of this capability are immense.

The UKUSA agencies can use machines to search through all the telephone
calls in the world, just as they do for written messages.

It has nothing to do with whether someone is deliberately tapping your
phone, simply whether you say a keyword or combination of keywords  that is
of interest to one of the UKUSA agencies.

P47

The keywords include such things as names of people, ships, organizations,
countries and subjects. They also include the known telex and  phone numbers
and Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.

The agencies also specify combinations of these keywords to help sift out
communications of interest.

For example, they might search for diplomatic cables containing both the
words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT  the
word 'consul' (to avoid the masses of routine consular communications).

It is these sets of words and numbers (and combinations of them), under a
particular category, that are placed in the Dictionary computers.

The whole system was developed by the NSA.

P51

The only known public reference to the ECHELON system was made in relation
to the Menwith Hill station. In July 1988, a United States  newspaper, the
Cleveland Plain Dealer, published a story about electronic monitoring of
phone calls of a Republican senator, Strom  Thurmond. The alleged monitoring
occurred at Menwith Hill.

Margaret Newsham worked at Menwith Hill as a contract employee of Lockheed
Space and Missiles Corporation. She is said to have told  congress staff
that, while at Menwith, she was able to listen through earphones to
telephone calls being monitored.

When investigators subpoenaed witnesses and sought access to plans and
manuals for the ECHELON system, they found there were no  formal controls
over who could be targeted; junior staff were able to feed in target names
to be searched for by the computers without any  check of their
authorization to do so.

None of this is surprising and it is likely to be insignificant compared
with official abuse of the system.

The capabilities of the ECHELON system are so great, and the secrecy
surrounding it makes it so impervious to democratic oversite, that the
temptation to use it for questionable projects seems irresistible.

In June 1992 a group of current 'highly placed intelligence operatives' from
the British GCHQ spoke to the paper Observer: 'We feel we can no  longer
remain silent regarding that which we regard to be gross malpractice and
negligence within the establishment in which we operate.'

They gave as examples GCHQ interception of three charitable organizations,
including Amnesty International and Christian Aid. As the  Observer
reported:

"At any time GCHQ is able to home in on their communications for a routine
target request," the GCHQ source said. In this case of phone taps  the
procedure is known as Mantis. With the telexes this is called Mayfly. By
keying in a code relating to Third World aid, the source was able to
demonstrate telex 'fixes' on the three organizations.

We can then sift through those communications further by selecting keywords
to search for.

Without actually naming it, this was a fairly precise description of how the
ECHELON Dictionary system works.

Note that it was being used for telephone calls.

Again, what was not revealed in the publicity was that this is a UKUSA-wide
system. The design of the ECHELON system means that the  interception of
these organizations could have occurred anywhere in the network, at any
station where the GCHQ had requested that the four  digit code covering the
necessary keywords and exclusion logic for Third World aid be placed.

P54

In a further misuse of ECHELON, a former intelligence employee revealed that
Prime Minister Margaret Thatcher had personally ordered  interception of the
Lonrho company, owners of the Observer newspaper, after that newspaper
published a series of articles in 1989 exposing  events surrounding a multi-
billion dollar British arms deal with Saudi Arabia.

The newspaper said the deal had been pushed strongly by Mrs. Thatcher, and
it was alleged that massive bribes were made to middlemen,  including her
son, Mark, who was said to have received a 10 million Pound commission.

The former employee of the British Joint Intelligence Committee, Robin
Robison, broke his indoctrination oaths and told the Observer that, as  part
of his job, which involved sorting intelligence reports from the British
intelligence agencies, he personally forwarded GCHQ transcripts of
intercepted communications about Lonrho to Mrs. Thatcher's office.

P9

Intelligence is not just neutral information; it can be powerful and
dangerous. Intelligence gathering and military force are two sides of the
same  coin. Both are used by countries and groups within countries to
advance their interests, often at the expense of others. To influence or
defeat  an opponent, knowledge can be more useful than military force.

The type of intelligence described in this book, signals intelligence
(SIGINT), is the largest, most secret and most expensive source of secret
intelligence in the world today.

P-5655

Like the British examples, and Mike Frost's Canadian examples, these stories
will only be the tip of the iceberg.

There is no evidence of a UKUSA code of ethics or a tradition of respect for
Parliament or civil liberties in their home countries.

The opposite seems to be true: that anything goes as long as you do not get
caught. Secrecy not only permits but encourages questionable  operations.

Three observations need to be made about the immense spying capability
provided by the ECHELON system.

The first is that the magnitude of the global network is a product of
decades of intense Cold War activity. Yet with the end of the Cold War it
has  not been demobilized and budgets have not been significantly cut.

Indeed the network has grown in power and reach. Yet the public
justifications, for example that 'economic intelligence is now more
important',  do not even begin to explain why this huge spy system should be
maintained. In the early 1980s the Cold War rhetoric was extreme and global
war was seriously discussed and planned for.

In the 1990s, the threat of global war has all but disappeared and none of
the allies faces the remotest serious military threat.

The second point about the ECHELON capabilities is that large parts of the
system, while hiding behind the Cold War for their justification,  were
never primarily about the Cold War at all.

The UKUSA alliance did mount massive operations against the Soviet Union and
other 'communists', but other elements of the worldwide  system, such as the
interception of Intelsat communications, microwave networks and many
regional satellites, were not aimed primarily at the  Russians, the Iraqis
or the North Koreans.

Then, and now, they are targeting groups which do not pose any physical
threat to the UKUSA allies at all.

But they are ideal to use against political opponents, economic competitors,
countries where the allies may want to gain some advantage  (especially
access to cheap resources) and administrations (like Nicaragua's Sandinista
government) which do not fit an American-dominated  world order.

The third observation is that telecommunications organizations - including
the telephone companies - are not blameless in all of this.

These companies, to which people pay their monthly bills believing that the
phone calls they make and the faxes they send are secure, should  well be
aware of the wholesale interception of 'private' communications that has
been occurring for decades.

Yet they neither invest in encryption technology nor insist that
organizations such as the Washington-based Intelsat Corporation provide
encryption.

They do not let their customers know that their international communications
are open to continuous interception. Wittingly or unwittingly, this  lack of
action assists large-scale spying against the individuals, businesses and
government and private organizations that innocently entrust  their
communications to these companies.

ECHELON is a staggeringly comprehensive and highly secret global spying
system. Around the world there are networks of spy stations and  spy
satellites which can intercept communications anywhere on the planet.

P18

Over the last 10 years a lot has been heard in New Zealand about the dangers
of 'bureaucratic capture', about senior officials controlling their
ministers rather than the other way around. The area of government activity
described in this book is the ultimate example of bureaucratic  capture.

Politicians, whom the public has presumed will be monitoring the
intelligence organizations on their behalf, have been systematically denied
the information required to do that job.

If a democratic society wants to control its secret agencies, it is
essential that the public and politicians have the information and the will
to do  so.

P113

Good encryption systems, such as PGP, developed privately by American Phil
Zimmerman, are publicly available, although they are still used  only by
relatively few people in the know.

The UKUSA agencies have been attempting to curb the spread of this
technology, which is a major threat to their influence, so far without
enough success to stop it.

It remains to be seen how much the public can find a technological answer to
maintaining privacy in a world with systems like ECHELON.

*** end of 'Secret Power' excerpt

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http://archive.jab.org/ctrl@;listserv.aol.com/
 <A HREF="http://archive.jab.org/ctrl@;listserv.aol.com/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to