ECHELON

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 92.81.122.13 (talk) at 21:26, 1 February 2010 (Updated a dead link). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A radome at RAF Menwith Hill, a site with satellite downlink capabilities believed to be used by ECHELON.
RAF Menwith Hill

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UK-USA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, known as AUSCANZUKUS).[1][2] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[3]

ECHELON was reportedly created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s, but since the end of the Cold War it is believed to search also for hints of terrorist plots, drug dealers' plans, and political and diplomatic intelligence.

The system has been reported in a number of public sources.[4] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[3]

In its report, the European Parliament states that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by groundstations located in the footprint of the downlink leg.

Organization

Template:UKUSA The UKUSA intelligence community is assessed by the European Parliament to include the signals intelligence agencies of each of the member states - the National Security Agency of the United States, the Government Communications Headquarters of Britain, the Communications Security Establishment of Canada, the Defence Signals Directorate of Australia, and the Government Communications Security Bureau of New Zealand. The EP report concludes that it seems likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s high frequency ("short wave") radio was widely used for military and diplomatic communication,[6] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: "If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites."[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics. As of 2006, 99% of the world's long-distance voice and data traffic was carried over optical-fiber.[7] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years in Central Europe to an amount between 0.4 and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[8] Thus the majority of communications cannot be intercepted by earth stations, but only by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past much Internet traffic was routed through the U.S. and the UK, but this has changed; for example 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt in 2000.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, or local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-USA systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[9]

Controversy

Intelligence monitoring of people in the area covered by the AUSCANZUKUS security agreement has caused concern. Some critics claim the system is being used not only to search for terrorist plots, drug dealers' plans, and political and diplomatic intelligence but also for large-scale commercial theft, international economic espionage and invasion of privacy. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[11][12] and the speech technology developed by the Belgian firm Lernout & Hauspie.[13] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[14][15]

In 2001 the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy.[5]

Bamford provides an alternate view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although does elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website the USA's National Security Agency is "a high technology organization... on the frontiers of communications and data processing". In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites are said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defense radar, communications satellites and ground based microwave communications.[16]

Name

The European Parliament's Temporary Committee on the ECHELON Interception System stated: "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail."[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Margaret Newsham claims that she worked on the configuration and installation of some of the software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, USA and in Menwith Hill, England, UK.[17] At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX would intercept communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[18]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to or participating in the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have a role in intercepting transmissions from telecommunications satellites:

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles "cannot be clearly established":

See also

Further reading

  • Bamford, James; The Puzzle Palace, Penguin, ISBN 0-14-006748-5; 1983
  • Hager, Nicky; Secret Power, New Zealand's Role in the International Spy Network; Craig Potton Publishing, Nelson, NZ; ISBN 0-908802-35-8; 1996
  • Bamford, James; Body of Secrets: Anatomy of the Ultra-Secret National Security Agency , Anchor, ISBN 0385499086; 2002
  • Keefe, Patrick Radden Chatter: dispatches from the secret world of global eavesdropping; Random House Publishing, New York, NY; ISBN 1-4000-6034-6; 2005
  • Bamford, James; The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, Doubleday, ISBN 0385521324; 2008

Notes

  1. ^ Google books - Echelon By John O'Neill, Jack O'Neill
  2. ^ "AUSCANNZUKUS Information Portal". auscannzukus.net. Retrieved 2010-02-01.
  3. ^ a b Bamford, James; Body of Secrets, Anchor, ISBN 0-385-49908-6; 2002
  4. ^ One of the earliest was a New Statesman article entitled Someone's Listening in 1988
  5. ^ a b c d e f g h i j k l m Schmid, Gerhard (2001-07-11). "On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI))" (pdf - 194 pages). European Parliament: Temporary Committee on the ECHELON Interception System. Retrieved 2008-03-27.
  6. ^ The Codebreakers, Ch. 10, 11
  7. ^ "NSA eavesdropping: How it might work". Retrieved 2006-08-27. {{cite web}}: Text "CNET News.com" ignored (help)
  8. ^ "Commercial Geostationary Satellite Transponder Markets for Latin America : Market Research Report". Retrieved 2006-08-27.
  9. ^ For example: "Nicky Hager Appearance before the European Parliament ECHELON Committee". 2001. Retrieved 2006-07-02. {{cite web}}: Unknown parameter |month= ignored (help)
  10. ^ "Nicky Hager Appearance before the European Parliament ECHELON Committee". 2001. Retrieved 2006-07-02. {{cite web}}: Unknown parameter |month= ignored (help)
  11. ^ Die Zeit: 40/1999 "Verrat unter Freunden" ("Treachery among friends", German), available at archiv.zeit.de
  12. ^ Report A5-0264/2001 of the European Parliament (English), available at European Parliament website
  13. ^ "Amerikanen maakten met Echelon L&H kapot". [1]. 2002-03-30. Retrieved 2008-03-28. {{cite web}}: External link in |work= (help) (Google's translation of the article into English).
  14. ^ "BBC News". 2000-07-06. Retrieved 2006-08-27. {{cite web}}: Text "EUROPE" ignored (help); Text "Echelon: Big brother without a cause" ignored (help)
  15. ^ "Interception capabilities 2000". Retrieved 2006-08-27.
  16. ^ Commonwealth of Australia, Official Committee Hansard (9 August 1999). JOINT STANDING COMMITTEE ON TREATIES, Reference: Pine Gap.
  17. ^ Elkjær, Bo (1999-11-17). "ECHELON Was My Baby". Ekstra Bladet. Retrieved 2006-05-17. {{cite news}}: Unknown parameter |coauthors= ignored (|author= suggested) (help)“Unfortunately, I can’t tell you all my duties. I am still bound by professional secrecy, and I would hate to go to prison or get involved in any trouble, if you know what I mean. In general, I can tell you that I was responsible for compiling the various systems and programs, configuring the whole thing and making it operational on mainframes"; "Margaret Newsham worked for the NSA through her employment at Ford and Lockheed from 1974 to 1984. In 1977 and 1978 Newsham was stationed at the largest listening post in the world at Menwith Hill, England...Ekstra Bladet has Margaret Newsham’s stationing orders from the US Department of Defense. She possessed the high security classification TOP SECRET CRYPTO."
  18. ^ "Names of ECHELON associated projects – image without any context". in "Interception Capabilities 2000 - PART 1". 2003-12-18. Retrieved 2006-08-27.
  19. ^ According to a statement by Terence Dudlee, the speaker of the US Navy in London in an interview to the German HR
    US-Armee lauscht von Darmstadt aus (German), hr online, 1 Oct 2004