ECHELON

From Wikipedia, the free encyclopedia
  (Redirected from Project Echelon)
Jump to: navigation, search
For other uses, see Echelon (disambiguation).
A radome at RAF Menwith Hill, a site with satellite uplink capabilities believed to be used by ECHELON.
Misawa Air Base Security Operations Center (MSOC)

ECHELON, originally a code-name, is now used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory nations to the UKUSA Security Agreement[1]Australia, Canada, New Zealand, the United Kingdom, and the United States. Referred to by a number of other abbreviations, including AUSCANNZUKUS[1] and Five Eyes,[2][3][4] it has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[5] It was created in the early 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, and was formally established in the year of 1971.[6][7]

By the end of the 20th century, the system referred to as "ECHELON" had evolved beyond its military/diplomatic origins, to also become "... a global system for the interception of private and commercial communications."[8]

The system has been reported in a number of public sources. One of the earliest reports to describe the program, code-named "ECHELON", was Duncan Campbell's 1988 article, "Somebody's listening", published in the New Statesman.[9] The program's capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[8] and by author James Bamford in his books on the National Security Agency of the United States.[5] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[8]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Name[edit]

The European Parliament's Temporary Committee on the ECHELON Interception System stated, "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail".[8] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, in the United States, and in Menwith Hill, England, in the UK.[10] At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[11][12]

Britain's The Guardian newspaper summarized the capabilities of the ECHELON system as follows:

A global network of electronic spy stations that can eavesdrop on telephones, faxes and computers. It can even track bank accounts. This information is stored in Echelon computers, which can keep millions of records on individuals.

Officially, however, Echelon doesn't exist.[13]

History[edit]

Origins (1960s–1970s)[edit]

In 1964, plans for the establishment of the ECHELON network took off after dozens of countries agreed to establish the International Telecommunications Satellite Organisation (Intelsat), which would own and operate a global constellation of communications satellites.[14]

In 1966, the first Intelsat satellite was launched into orbit. From 1970 to 1971, the Government Communications Headquarters (GCHQ) of Britain began to operate a secret signal station at Morwenstow, near Bude in Cornwall, England. The station intercepted satellite communications over the Atlantic and Indian Oceans. Soon afterwards, the U.S. National Security Agency (NSA) built a second signal station at Yakima, near Seattle, for the interception of satellite communications over the Pacific Ocean.[14]

Expansion (1980s)[edit]

In 1981, the GCHQ and the NSA started the construction of the first global Wide area network (WAN). Soon afterwards, Australia, Canada, and New Zealand joined the ECHELON system.[14]

In 1988, the first disclosure of the ECHELON surveillance system originated from Margaret Newsham, a Lockheed employee. Newsham told a member of the U.S. Congress that the telephone calls of Strom Thurmond, a Republican U.S. senator, were being collected by the NSA. Congressional investigators determined that "targeting of U.S. political figures would not occur by accident, but was designed into the system from the start."[9] In the same year, an article titled "Somebody's listening", written by investigative journalist Duncan Campbell in the New Statesman, described the signals intelligence gathering activities of a program code-named "ECHELON".[9]

Public disclosures (1990-2000)[edit]

The New Zealand journalist Nicky Hager, who testified before the European Parliament and provided specific details about the ECHELON surveillance system[15]

In 1996, a detailed description of ECHELON was provided by New Zealand journalist Nicky Hager in his 1996 book "Secret Power – New Zealand's Role in the International Spy Network"[16] Two years later, Hager's book was cited by the European Parliament in a report titled "An Appraisal of the Technology of Political Control" (PE 168.184).[17]

In March 1999, for the first time in history, the Australian government admitted that news reports about the top secret UKUSA Agreement were true.[14] Martin Brady, the director of Australia's Defence Signals Directorate (DSD) told the Australian broadcasting channel Nine Network that the DSD "does co-operate with counterpart signals intelligence organisations overseas under the UKUSA relationship"[18]

In 2000, James Woolsey, the former Director of the U.S. Central Intelligence Agency, confirmed that U.S. intelligence uses interception systems and keyword searches to monitor European businesses.[19]

Lawmakers in the United States feared that the ECHELON system could be used to monitor U.S. citizens.[20] According to The New York Times, the ECHELON system has been "shrouded in such secrecy that its very existence has been difficult to prove."[20] Critics said the ECHELON system emerged from the Cold War as a "Big Brother without a cause".[21]

European Parliament investigation (2000-01)[edit]

In July 2000, the Temporary Committee on the ECHELON Interception System was established by the European parliament to investigate the surveillance network. It was chaired by the Portuguese politician Carlos Coelho, who was in charge of supervising investigations throughout 2000 and 2001.

In May 2001, as the committee finalised its report on the ECHELON system, a delegation travelled to Washington, D.C. to attend meetings with U.S. officials from the following agencies and departments:

All meetings were cancelled by the U.S. government and the committee was forced to end its trip prematurely.[22] According to a BBC correspondent in May 2001, "The US Government still refuses to admit that Echelon even exists"[6]

In July 2001, the Temporary Committee on the ECHELON Interception System released its final report.[23] On 5 September 2001, the European Parliament voted to accept the committee's report.[24]

Organization[edit]

UKUSA Community
Map of UKUSA Community countries

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[8]

Likely satellite intercept stations[edit]

In 2001, the EP report (p. 54 ff)[8] listed the following ground stations as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

Other potentially related stations[edit]

The following stations are listed in the EP report (p. 57 ff) as ones whose roles "cannot be clearly established":

List of intercept stations according to Edward Snowden's documents
Operated by the United States
Country Location Operator(s) Codename
 Brazil Brasília SCS
 Germany Bad Aibling, Munich GARLICK[33]
 India New Delhi SCS
 Japan Misawa, Tōhoku region LADYLOVE[36]
 Thailand Bangkok (?) LEMONWOOD[37]
 United Kingdom Menwith Hill, Harrogate MOONPENNY[37]
 United States Sugar Grove, Virginia TIMBERLINE[40]
Yakima, Washington JACKKNIFE[37]
Sábana Seca, Puerto Rico CORALINE[37]
Not operated by the United States (2nd party)
Country Location Contributor(s) Codename
 Australia Geraldton, WA STELLAR[35]
Darwin, NT  ?[35]
 New Zealand Waihopai, Blenheim IRONSAND[35]
 United Kingdom Bude, Cornwall CARBOY[40]
 Cyprus Ayios Nikolaos Station SOUNDER[44]
 Kenya Nairobi SCAPEL[37]
 Oman SNICK[37]
An NSA document dating from 2012. It was leaked by Edward Snowden to the Dutch newspaper NRC Handelsblad. The orange dots on the map correspond to the locations of several FORNSAT/ECHELON stations

Capabilities[edit]

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[8] During World War II and through the 1950s, high-frequency ("short-wave") radio was widely used for military and diplomatic communication,[45] and could be intercepted at great distances.[8] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: "If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites".[8]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world's long-distance voice and data traffic was carried over optical-fiber.[46] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[8] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[47] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[8]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the United States and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt, Germany.[8] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[8]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-U.S. systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[48]

Concerns[edit]

British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[48] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[8][49] and the speech technology developed by the Belgian firm Lernout & Hauspie.[50]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the U.S. intelligence agencies.[8]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process. In its report, the committee of the European Parliament stated categorically that the Echelon network was being used to intercept not only military communications, but also private and business ones. In its epigraph to the report, the parliamentary committee quoted Juvenal, "Sed quis custodiet ipsos custodes." ("But who will watch the watchers").[8] Bamford, in the Guardian in May 2001, warned that if Echelon were to continue unchecked, it could become a "cyber secret police, without courts, juries, or the right to a defence".[51]

Alleged examples of espionage conducted by the members of the "Five Eyes" include:

  • U.S. agents gathered "detailed biometric information" on the 8th Secretary-General of the United Nations, Ban Ki-Moon[56][57]
  • In the early 1990s, the U.S. National Security Agency intercepted the communications between the European aerospace company Airbus and the Saudi Arabian national airline. In 1994, Airbus lost a $6 billion contract with Saudi Arabia after the NSA, acting as a whistleblower, reported that Airbus officials had been bribing Saudi officials to secure the contract.[58] As a result, the American aerospace company McDonnell Douglas (now part of Boeing) won the multi-billion dollar contract instead of Airbus.[59]
  • In order to boost America's position in trade negotiations with the then Japanese Trade Minister Ryutaro Hashimoto, in 1995 the CIA eavesdropped on the conversations between Japanese bureaucrats and executives of car manufacturers Toyota and Nissan.[61]

Hardware[edit]

According to its website, the U.S. National Security Agency (NSA) is "a high technology organization...on the frontiers of communications and data processing". In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence- and other radar's capabilities, satellite's ground station's transmissions and ground-based microwave communications.[62]

In popular culture[edit]

The television series Alias made recurring references to ECHELON throughout its run.

Echelon Conspiracy, inspired by the surveillance system ECHELON, is a 2009 action thriller film directed by Greg Marcks. It tells the story of Max Peterson (Shane West), an American computer specialist who attempts to uncover a secret plot to turn the world into a global police state. After being chased down by NSA agent Raymond Burke (Martin Sheen), Peterson decides to flee to Moscow.

The video game series Tom Clancy's Splinter Cell also draws inspiration from this. The series features the protagonist, Sam Fisher, a trained operative belonging to a fictional branch of the National Security Agency called Third Echelon (later, in Splinter Cell: Blacklist, the unit is replaced by the Fourth Echelon).

The 2007 film The Bourne Ultimatum makes several references to ECHELON. A CIA listening station in London is alerted when ECHELON detects the keyword "Blackbriar" in a cell phone conversation between a journalist and his editor.[63] Later in the film, CIA Deputy Director Pamela Landy requests an "ECHELON package" on the main character, Jason Bourne.

Alternative rock band Thirty Seconds To Mars' first album includes a song called "Echelon". Their fan base is also referred to as the Echelon, though an explanation hasn't been given as to why the fanbase and the song are referred to as such.

In the 2000 computer game Deus Ex, the signals intelligence supercomputers Daedalus and Icarus (later Helios) are referred to as Echelon IV.

See also[edit]

Notes and references[edit]

  1. ^ a b Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".
    From Talk:UKUSA Agreement: Per documents officially released by both the Government Communications Headquarters and the National Security Agency, this agreement is referred to as the UKUSA Agreement. This name is subsequently used by media sources reporting on the story, as written in new references used for the article. The NSA press release provides a pronunciation guide, indicating that "UKUSA" should not be read as two separate entities. (The National Archives) at the Wayback Machine (archived May 2, 2013) (National Security Agency)
  2. ^ "UK 'biggest spy' among the Five Eyes". News Corp Australia. 22 June 2013. Retrieved 19 October 2013. 
  3. ^ Google booksEchelon by John O'Neill
  4. ^ "AUSCANNZUKUS Information Portal". auscannzukus.net. Archived from the original on 2012-02-20. Retrieved 1 February 2010. 
  5. ^ a b Bamford, James; Body of Secrets, Anchor, ISBN 0-385-49908-6; 2002
  6. ^ a b "Q&A: What you need to know about Echelon". BBC. 29 May 2001. 
  7. ^ Nabbali, Talitha; Perry, Mark (March 2004). "Going for the throat". Computer Law & Security Review 20 (2): 84–97. doi:10.1016/S0267-3649(04)00018-4. It wasn't until 1971 that the UKUSA allies began ECHELON 
  8. ^ a b c d e f g h i j k l m n o p Schmid, Gerhard (11 July 2001). "On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI))" (pdf – 194 pages). European Parliament: Temporary Committee on the ECHELON Interception System. Retrieved 5 January 2013. 
  9. ^ a b c Campbell, Duncan (12 August 1988). "Somebody's Listening". New Statesman. Retrieved 27 November 2013. 
  10. ^ Elkjær, Bo; Kenan Seeberg (17 November 1999). "ECHELON Was My Baby". Ekstra Bladet. Retrieved 17 May 2006.  “Unfortunately, I can’t tell you all my duties. I am still bound by professional secrecy, and I would hate to go to prison or get involved in any trouble, if you know what I mean. In general, I can tell you that I was responsible for compiling the various systems and programs, configuring the whole thing and making it operational on mainframes"; "Margaret Newsham worked for the NSA through her employment at Ford and Lockheed from 1974 to 1984. In 1977 and 1978 Newsham was stationed at the largest listening post in the world at Menwith Hill, England ... Ekstra Bladet has Margaret Newsham's stationing orders from the US Department of Defense. She possessed the high security classification TOP SECRET CRYPTO."
  11. ^ Goodwins, Rupert (29 June 2000). "Echelon: How it works". ZDNet. Retrieved 28 January 2014. 
  12. ^ =Campbell, Duncan (25 July 2000). "Inside Echelon". Heise Online. Retrieved 28 January 2014. 
  13. ^ Perrone, Jane (29 May 2001). "The Echelon spy network". The Guardian. Retrieved 28 January 2014. 
  14. ^ a b c d Duncan Campbell. "Echelon: World under watch, an introduction". ZDNet. Retrieved 19 December 2013. 
  15. ^ Kieren McCarthy (14 September 2001). "This is how we know Echelon exists". The Register. Retrieved 19 December 2013. 
  16. ^ Duncan Campbell (1 June 2001). "Echelon Chronology". Heise Online. Retrieved 19 December 2013. 
  17. ^ Wright, Steve (6 January 1998). "An Appraisal of Technologies of Political Control". European Parliament. Retrieved 28 January 2014. 
  18. ^ Duncan Campbell and Mark Honigsbaum (23 May 1999). "Britain and US spy on world". The Observer. Retrieved 19 December 2013. 
  19. ^ R. James Woolsey (17 March 2000). "Why We Spy on Our Allies". The Wall Street Journal. 
  20. ^ a b NIALL McKAY (27 May 1999). "Lawmakers Raise Questions About International Spy Network". The New York Times. Retrieved 19 December 2013. 
  21. ^ SUZANNE DALEY (24 February 2000). "An Electronic Spy Scare Is Alarming Europe". The New York Times. Retrieved 19 December 2013. 
  22. ^ a b c d Roxburgh, Angus (11 May 2001). "EU investigators 'snubbed' in US". BBC. Retrieved 28 January 2014. 
  23. ^ "Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))". European Parliament. 11 July 2001. Retrieved 10 September 2013. 
  24. ^ "Report: Echelon exists, should be guarded against". USA Today. Associated Press. 5 September 2001. Retrieved 7 February 2014. 
  25. ^ Le Monde Diplomatique, September 2010
  26. ^ a b Eames, David (19 March 2010). "Waihopai a key link in global intelligence network". The New Zealand Herald. Retrieved 28 January 2014. Both Waihopai and the Tangimoana radio listening post near Palmerston North have been identified as key players in the United States-led Echelon spy programme. 
  27. ^ Stupak, edited by David S. Greisler, Ronald J. (2007). Handbook of technology management in public administration. CRC/Taylor & Francis. p. 592. ISBN 1420017012. 
  28. ^ "Teufelsberg mirrors Berlin's dramatic history". Deutsche Welle. Retrieved 28 January 2014. More than 1,000 people are said to have worked here around the clock, every day of the year. They were part of the global ECHELON surveillance network. 
  29. ^ Beddow, Rachel. "Teufelsberg, Berlin's Undisputed King Of Ghostowns, Set For Redevelopment". NPR. Retrieved 28 January 2014. The Teufelsberg mission is still shrouded in secrecy, but it's generally agreed that the station was part of the ECHELON network that listened in to the Eastern Bloc. 
  30. ^ According to a statement by Terence Dudlee, the speaker of the US Navy in London, in an interview to the German HR (Hessischer Rundfunk)
    US-Armee lauscht von Darmstadt aus at the Wayback Machine (archived June 30, 2007) (German), hr online, 1 October 2004
  31. ^ a b Roberto Kaz e José Casado. "Capitais de 4 países também abrigaram escritório da NSA e CIA" (in Portuguese). O Globo. Retrieved 31 January 2014. 
  32. ^ a b Hubert Gude, Laura Poitras and Marcel Rosenbach. "German Intelligence Sends Massive Amounts of Data to the NSA". Der Spiegel. Retrieved 31 January 2014. 
  33. ^ "Cover Story: How the NSA Targets Germany and Europe". Der Spiegel. Retrieved 31 January 2014. 
  34. ^ a b "US spy centre in India too". Deccan Chronicle. 30 October 2013. Retrieved 31 January 2014. 
  35. ^ a b c d e f g h i j Dorling, Philip. "Singapore, South Korea revealed as Five Eyes spying partners". The Sydney Morning Herald. Retrieved 30 January 2014. 
  36. ^ "Document 12. "Activation of Echelon Units," from History of the Air Intelligence Agency, 1 January - 31 December 1994, Volume I (San Antonio, TX: AIA, 1995).". George Washington University. The second extract notes that AIA’s participation in a classified activity "had been limited to LADYLOVE operations at Misawa AB [Air Base], Japan." 
  37. ^ a b c d e f "Eyes Wide Open". Privacy International. p. 11. Retrieved 31 January 2014. 
  38. ^ Norton-Taylor, Richard (1 March 2012). "Menwith Hill eavesdropping base undergoes massive expansion". The Guardian. Retrieved 31 January 2014. 
  39. ^ Steelhammer, Rick (4 January 2014). "In W.Va., mountains of NSA secrecy". The Charleston Gazette. Retrieved 31 January 2014. 
  40. ^ a b Laura Poitras, Marcel Rosenbach and Holger Stark. "Friendly Fire: How GCHQ Monitors Germany, Israel and the EU". Der Spiegel. Retrieved 31 January 2014. 
  41. ^ Troianello, Craig (4 April 2013). "NSA to close Yakima Training Center facility". The Seattle Times. Retrieved 31 January 2014. 
  42. ^ Roberto Kaz and José Casado. "Capitais de 4 países também abrigaram escritório da NSA e CIA" (in Portuguese). O Globo. Retrieved 31 January 2014. 
  43. ^ a b c d Nick Hopkins and Julian Borger (1 August 2013). "Exclusive: NSA pays £100m in secret funding for GCHQ". The Guardian. Retrieved 31 January 2014. 
  44. ^ Squires, Nick (5 November 2013). "British military base in Cyprus 'used to spy on Middle East'". London: The Daily Telegraph. Retrieved 31 January 2014. 
  45. ^ The Codebreakers, Ch. 10, 11
  46. ^ "NSA eavesdropping: How it might work". CNET News.com. Retrieved 27 August 2006. 
  47. ^ "Commercial Geostationary Satellite Transponder Markets for Latin America : Market Research Report". Retrieved 27 August 2006. 
  48. ^ a b For example: "Nicky Hager Appearance before the Euro ean Parliament ECHELON Committee". April 2001. Retrieved 2 July 2006. 
  49. ^ Die Zeit: 40/1999 "Verrat unter Freunden" ("Treachery among friends", German), available at Zeit.de at the Wayback Machine (archived October 9, 2008)
  50. ^ "Amerikanen maakten met Echelon L&H kapot". daanspeak.com. 30 March 2002. Archived from the original on 2012-03-21. Retrieved 28 March 2008.  (Google's translation of the article into English).
  51. ^ Bustillos, Maria (9 June 2013). "Our reflection in the N.S.A.'s PRISM". The New Yorker. Retrieved: 2013-10-12.
  52. ^ "Thatcher 'spied on ministers'". BBC. 25 February 2000. 
  53. ^ Vernon Loeb (12 December 1998). "NSA Admits to Spying on Princess Diana". The Washington Post. 
  54. ^ "UK 'spied on UN's Kofi Annan'". BBC. 26 February 2004. Retrieved 21 September 2013. 
  55. ^ PATRICK E. TYLER (26 February 2004). "Ex-Minister Says British Spies Bugged Kofi Annan’s Office". The New York Times. Retrieved 21 September 2013. 
  56. ^ "US diplomats spied on UN leadership". The Guardian. Retrieved 27 August 2013. 
  57. ^ Marcel Rosenbach and Holger Stark. "Diplomats or Spooks? How US Diplomats Were Told to Spy on UN and Ban Ki-Moon". Der Spiegel. Retrieved 27 August 2013. 
  58. ^ "Echelon: Big brother without a cause". BBC News. 6 July 2000. Retrieved 27 August 2006. 
  59. ^ "Airbus's secret past". The Economist. 14 June 2003. Retrieved 15 October 2013. 
  60. ^ "Big Surveillance Project For the Amazon Jungle Teeters Over Scandals". The Christian Science Monitor. Retrieved 15 October 2013. 
  61. ^ DAVID E. SANGER and TIM WEINER (15 October 1995). "Emerging Role For the C.I.A.: Economic Spy". The New York Times. Retrieved 15 October 2013. 
  62. ^ Pine Gap at the Wayback Machine (archived May 14, 2013), Official Committee Hansard, Joint Standing Committee on Treaties, 9 August 1999. Commonwealth of Australia.
  63. ^ Gunn, Angela. "Security goes to the movies: The Bourne Ultimatum". Computerworld. Retrieved 30 April 2014. 

Bibliography[edit]

  • Aldrich, Richard J.; GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency, HarperCollins, July 2010. ISBN 978-0-00-727847-3
  • Bamford, James; The Puzzle Palace, Penguin, ISBN 0-14-006748-5; 1983
  • Bamford, James; The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, Doubleday, ISBN 0-385-52132-4; 2008
  • Hager, Nicky; Secret Power, New Zealand's Role in the International Spy Network; Craig Potton Publishing, Nelson, NZ; ISBN 0-908802-35-8; 1996
  • Keefe, Patrick Radden Chatter: dispatches from the secret world of global eavesdropping; Random House Publishing, New York, NY; ISBN 1-4000-6034-6; 2005