ECHELON: Difference between revisions

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
imported>Abcmaxx
 
imported>GreenC bot
 
Line 17: Line 17:
  |archive-url=https://web.archive.org/web/20130502100834/http://www.nationalarchives.gov.uk/news/471.htm  
  |archive-url=https://web.archive.org/web/20130502100834/http://www.nationalarchives.gov.uk/news/471.htm  
  |archive-date=2 May 2013
  |archive-date=2 May 2013
  }}  [http://www.nsa.gov/public_info/press_room/2010/ukusa.shtml (National Security Agency)] {{Webarchive|url=https://web.archive.org/web/20130716140847/http://www.nsa.gov/public_info/press_room/2010/ukusa.shtml |date=16 July 2013 }}"</ref> Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the [[Five Eyes]].<ref>{{cite news|title=UK 'biggest spy' among the Five Eyes|url=http://www.news.com.au/technology/uk-spying-more-extensive-than-in-us/story-e6frfro0-1226667900434|publisher=[[News Corp Australia]]|access-date=19 October 2013|date=22 June 2013|archive-url=https://web.archive.org/web/20131023161357/http://www.news.com.au/technology/uk-spying-more-extensive-than-in-us/story-e6frfro0-1226667900434|archive-date=23 October 2013|url-status=live}}</ref><ref>[[Google Book Search|Google books]] – [https://archive.org/details/echelonsomebodys0000onei Echelon] by John O'Neill</ref><ref>{{cite web| url=http://auscannzukus.net/|archive-url=https://web.archive.org/web/20120220104120/http://auscannzukus.net/|archive-date=2012-02-20 |title=AUSCANNZUKUS Information Portal |publisher=auscannzukus.net |access-date=1 February 2010}}</ref>
  }}  [http://www.nsa.gov/public_info/press_room/2010/ukusa.shtml (National Security Agency)] {{Webarchive|url=https://web.archive.org/web/20130716140847/http://www.nsa.gov/public_info/press_room/2010/ukusa.shtml |date=16 July 2013 }}"</ref> Australia, Canada, New Zealand, the UK and the United States, also known as the [[Five Eyes]].<ref>{{cite news|title=UK 'biggest spy' among the Five Eyes|url=http://www.news.com.au/technology/uk-spying-more-extensive-than-in-us/story-e6frfro0-1226667900434|publisher=[[News Corp Australia]]|access-date=19 October 2013|date=22 June 2013|archive-url=https://web.archive.org/web/20131023161357/http://www.news.com.au/technology/uk-spying-more-extensive-than-in-us/story-e6frfro0-1226667900434|archive-date=23 October 2013|url-status=live}}</ref><ref>[[Google Book Search|Google books]] – [https://archive.org/details/echelonsomebodys0000onei Echelon] by John O'Neill</ref><ref>{{cite web| url=http://auscannzukus.net/|archive-url=https://web.archive.org/web/20120220104120/http://auscannzukus.net/|archive-date=2012-02-20 |title=AUSCANNZUKUS Information Portal |publisher=auscannzukus.net |access-date=1 February 2010}}</ref>


Created in the late 1960s to monitor the [[military]] and [[diplomacy|diplomatic]] communications of the [[Soviet Union]] and its [[Eastern Bloc]] allies during the [[Cold War]], the ECHELON project became formally established in 1971.<ref name="bbcechelon1">{{cite news|title=Q&A: What you need to know about Echelon|url=http://news.bbc.co.uk/2/hi/sci/tech/1357513.stm|publisher=BBC|date=29 May 2001|access-date=17 December 2013|archive-url=https://web.archive.org/web/20131218051611/http://news.bbc.co.uk/2/hi/sci/tech/1357513.stm|archive-date=18 December 2013|url-status=live}}</ref><ref>{{cite journal|last=Nabbali|first=Talitha|author2=Perry, Mark|title=Going for the throat|journal=Computer Law & Security Review|date=March 2004|volume=20|issue=2|pages=84–97|doi=10.1016/S0267-3649(04)00018-4|quote=It wasn't until 1971 that the UKUSA allies began ECHELON}}</ref> By the end of the 20th century, it had greatly expanded.<ref name="EP">{{cite web |url=http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0//EN&language=EN |title=On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI)) |last=Schmid |first=Gerhard |date=11 July 2001 |publisher=European Parliament: Temporary Committee on the ECHELON Interception System |access-date=5 January 2013 |archive-url=https://web.archive.org/web/20131226152235/http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-%2F%2FEP%2F%2FNONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0%2F%2FEN&language=EN |archive-date=26 December 2013 |url-status=live }}</ref>
Created in the late 1960s to monitor the [[military]] and [[diplomacy|diplomatic]] communications of the [[Soviet Union]] and its [[Eastern Bloc]] allies during the [[Cold War]], the ECHELON project became formally established in 1971.<ref name="bbcechelon1">{{cite news|title=Q&A: What you need to know about Echelon|url=https://news.bbc.co.uk/2/hi/sci/tech/1357513.stm|publisher=BBC|date=29 May 2001|access-date=17 December 2013|archive-url=https://web.archive.org/web/20131218051611/http://news.bbc.co.uk/2/hi/sci/tech/1357513.stm|archive-date=18 December 2013|url-status=live}}</ref><ref>{{cite journal|last=Nabbali|first=Talitha|author2=Perry, Mark|title=Going for the throat|journal=Computer Law & Security Review|date=March 2004|volume=20|issue=2|pages=84–97|doi=10.1016/S0267-3649(04)00018-4|quote=It wasn't until 1971 that the UKUSA allies began ECHELON}}</ref> By the end of the 20th century, it had greatly expanded.<ref name="EP">{{cite web |url=http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0//EN&language=EN |title=On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI)) |last=Schmid |first=Gerhard |date=11 July 2001 |publisher=European Parliament: Temporary Committee on the ECHELON Interception System |access-date=5 January 2013 |archive-url=https://web.archive.org/web/20131226152235/http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-%2F%2FEP%2F%2FNONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0%2F%2FEN&language=EN |archive-date=26 December 2013 |url-status=live }}</ref>


== Organization ==
== Organization ==
Line 30: Line 30:
* the [[Government Communications Security Bureau]] of New Zealand.
* the [[Government Communications Security Bureau]] of New Zealand.
{| class="wikitable"  style="float: center; margin:10px"
{| class="wikitable"  style="float: center; margin:10px"
|+List of intercept stations according to [[Edward Snowden]]'s documents
|+ List of intercept stations according to [[Edward Snowden]]'s documents
|-
|-
!colspan="4" style="background: #ffdead;" |Operated by the United States
!colspan="4" style="background: #ffdead;" |Operated by the United States
Line 44: Line 44:
* {{flagicon|United States}} [[Central Intelligence Agency|CIA]]<ref name=globo1/>
* {{flagicon|United States}} [[Central Intelligence Agency|CIA]]<ref name=globo1/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="globo1">{{cite web|first1=Roberto|last1=Kaz|first2=José|last2=Casado|title=Capitais de 4 países também abrigaram escritório da NSA e CIA|url=http://oglobo.globo.com/mundo/capitais-de-4-paises-tambem-abrigaram-escritorio-da-nsa-cia-8966597|work=[[O Globo]]|date=9 July 2013|access-date=31 January 2014|language=pt|archive-url=https://web.archive.org/web/20131206164747/http://oglobo.globo.com/mundo/capitais-de-4-paises-tambem-abrigaram-escritorio-da-nsa-cia-8966597|archive-date=6 December 2013|url-status=live}}</ref>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="globo1">{{cite web|first1=Roberto|last1=Kaz|first2=José|last2=Casado|title=Capitais de 4 países também abrigaram escritório da NSA e CIA|url=http://oglobo.globo.com/mundo/capitais-de-4-paises-tambem-abrigaram-escritorio-da-nsa-cia-8966597|work=[[O Globo]]|date=9 July 2013|access-date=31 January 2014|language=pt|archive-url=https://web.archive.org/web/20131206164747/http://oglobo.globo.com/mundo/capitais-de-4-paises-tambem-abrigaram-escritorio-da-nsa-cia-8966597|archive-date=6 December 2013|url-status=live}}</ref>
| '''[[Special Collection Service|SCS]]'''
| [[Special Collection Service|SCS]]
|-
|-
| {{flag|Germany}}
| {{flag|Germany}}
Line 51: Line 51:
* {{flagicon|Germany}} [[Bundesnachrichtendienst|BND]]<ref name="bndnsa">{{cite news|first1=Hubert|last1=Gude|first2=Laura|last2=Poitras|first3=Marcel|last3=Rosenbach|title=German Intelligence Sends Massive Amounts of Data to the NSA|url=http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html|work=[[Der Spiegel]]|date=5 August 2013|access-date=31 January 2014|archive-url=https://web.archive.org/web/20140125151648/http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html|archive-date=25 January 2014|url-status=live}}</ref>
* {{flagicon|Germany}} [[Bundesnachrichtendienst|BND]]<ref name="bndnsa">{{cite news|first1=Hubert|last1=Gude|first2=Laura|last2=Poitras|first3=Marcel|last3=Rosenbach|title=German Intelligence Sends Massive Amounts of Data to the NSA|url=http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html|work=[[Der Spiegel]]|date=5 August 2013|access-date=31 January 2014|archive-url=https://web.archive.org/web/20140125151648/http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html|archive-date=25 January 2014|url-status=live}}</ref>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="bndnsa"/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="bndnsa"/>
| '''GARLICK'''<ref>{{cite news|title=Cover Story: How the NSA Targets Germany and Europe|url=http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609-2.html|work=[[Der Spiegel]]|date=July 2013|access-date=31 January 2014|archive-url=https://web.archive.org/web/20131208103706/http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609-2.html|archive-date=8 December 2013|url-status=live|last1=Poitras|first1=Laura|last2=Rosenbach|first2=Marcel|last3=Schmid|first3=Fidelius|last4=Stark|first4=Holger|last5=Stock|first5=Jonathan}}</ref>
| GARLICK<ref>{{cite news|title=Cover Story: How the NSA Targets Germany and Europe|url=http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609-2.html|work=[[Der Spiegel]]|date=July 2013|access-date=31 January 2014|archive-url=https://web.archive.org/web/20131208103706/http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609-2.html|archive-date=8 December 2013|url-status=live|last1=Poitras|first1=Laura|last2=Rosenbach|first2=Marcel|last3=Schmid|first3=Fidelius|last4=Stark|first4=Holger|last5=Stock|first5=Jonathan}}</ref>
|-
|-
| {{flag|India}}
| {{flag|India}}
Line 58: Line 58:
* {{flagicon|United States}} [[Central Intelligence Agency|CIA]]<ref name="deccam">{{cite web|title=US spy centre in India too |url=http://www.deccanchronicle.com/131030/news-current-affairs/article/us%E2%80%88spy-centre-india-too |work=[[Deccan Chronicle]] |access-date=31 January 2014 |date=30 October 2013 |url-status=dead |archive-url=https://web.archive.org/web/20140202182811/http://www.deccanchronicle.com/131030/news-current-affairs/article/us%E2%80%88spy-centre-india-too |archive-date= 2 February 2014 }}</ref>
* {{flagicon|United States}} [[Central Intelligence Agency|CIA]]<ref name="deccam">{{cite web|title=US spy centre in India too |url=http://www.deccanchronicle.com/131030/news-current-affairs/article/us%E2%80%88spy-centre-india-too |work=[[Deccan Chronicle]] |access-date=31 January 2014 |date=30 October 2013 |url-status=dead |archive-url=https://web.archive.org/web/20140202182811/http://www.deccanchronicle.com/131030/news-current-affairs/article/us%E2%80%88spy-centre-india-too |archive-date= 2 February 2014 }}</ref>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name=deccam/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name=deccam/>
| '''[[Special Collection Service|SCS]]'''
| [[Special Collection Service|SCS]]
|-
|-
| {{flag|Japan}}
| {{flag|Japan}}
Line 65: Line 65:
* {{flagicon|United States}} [[United States Air Force|US Air Force]]<ref name="stellar"/>
* {{flagicon|United States}} [[United States Air Force|US Air Force]]<ref name="stellar"/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="stellar"/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="stellar"/>
| '''LADYLOVE'''<ref>{{cite web|title=Document 12. "Activation of Echelon Units," from History of the Air Intelligence Agency, 1 January - 31 December 1994, Volume I (San Antonio, TX: AIA, 1995).|publisher=[[George Washington University]]|quote=The second extract notes that AIA's participation in a classified activity "had been limited to LADYLOVE operations at Misawa AB [Air Base], Japan."}}</ref>
| LADYLOVE<ref>{{cite web |url=https://nsarchive2.gwu.edu/NSAEBB/NSAEBB23/index.html |title=Document 12. "Activation of Echelon Units" from History of the Air Intelligence Agency, 1 January 31 December 1994, Volume I (San Antonio, TX: AIA, 1995) |publisher=[[George Washington University]] |quote=The second extract notes that AIA's participation in a classified activity 'had been limited to LADYLOVE operations at Misawa AB [Air Base], Japan'.}}</ref>
|-
|-
| {{flag|Thailand}}
| {{flag|Thailand}}
Line 73: Line 73:
* {{flagicon|United States}} [[Central Intelligence Agency|CIA]] (?)
* {{flagicon|United States}} [[Central Intelligence Agency|CIA]] (?)
* {{flagicon|United States}} [[National Security Agency|NSA]] (?)
* {{flagicon|United States}} [[National Security Agency|NSA]] (?)
|'''INDRA /'''
|INDRA /  
'''LEMONWOOD'''<ref name="pri" />
LEMONWOOD<ref name="pri" />
|-
|-
| {{flag|United Kingdom}}
| {{flag|United Kingdom}}
Line 80: Line 80:
|
|
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref>{{cite web|last=Norton-Taylor|first=Richard|title=Menwith Hill eavesdropping base undergoes massive expansion|url=https://www.theguardian.com/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion|work=[[The Guardian]]|access-date=31 January 2014|date=1 March 2012|archive-url=https://web.archive.org/web/20140126001413/http://www.theguardian.com/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion|archive-date=26 January 2014|url-status=live}}</ref>* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref>{{cite web|last=Norton-Taylor|first=Richard|title=Menwith Hill eavesdropping base undergoes massive expansion|url=https://www.theguardian.com/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion|work=[[The Guardian]]|access-date=31 January 2014|date=1 March 2012|archive-url=https://web.archive.org/web/20140126001413/http://www.theguardian.com/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion|archive-date=26 January 2014|url-status=live}}</ref>* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]
| '''MOONPENNY'''<ref name=pri/>
| MOONPENNY<ref name=pri/>
|-
|-
| rowspan="3" | {{flag|United States}}
| rowspan="3" | {{flag|United States}}
Line 86: Line 86:
|
|
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref>{{cite web|last=Steelhammer|first=Rick|title=In W.Va., mountains of NSA secrecy|url=http://www.wvgazette.com/News/201401040095|work=[[The Charleston Gazette]]|access-date=31 January 2014|date=4 January 2014|archive-url=https://web.archive.org/web/20140202111720/http://www.wvgazette.com/News/201401040095|archive-date=2 February 2014|url-status=live}}</ref>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref>{{cite web|last=Steelhammer|first=Rick|title=In W.Va., mountains of NSA secrecy|url=http://www.wvgazette.com/News/201401040095|work=[[The Charleston Gazette]]|access-date=31 January 2014|date=4 January 2014|archive-url=https://web.archive.org/web/20140202111720/http://www.wvgazette.com/News/201401040095|archive-date=2 February 2014|url-status=live}}</ref>
| '''TIMBERLINE'''<ref name=carboy/>
| TIMBERLINE<ref name=carboy/>
|-
|-
| [[Yakima Training Center|Yakima, Washington]]
| [[Yakima Training Center|Yakima, Washington]]
|
|
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref>{{cite web |last=Troianello |first=Craig |title=NSA to close Yakima Training Center facility |url=http://seattletimes.com/html/localnews/2020713369_listeningpostxml.html |work=[[The Seattle Times]] |access-date=31 January 2014 |date=4 April 2013 |url-status=dead |archive-url=https://web.archive.org/web/20140219144524/http://seattletimes.com/html/localnews/2020713369_listeningpostxml.html |archive-date=19 February 2014 }}</ref>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref>{{cite web |last=Troianello |first=Craig |title=NSA to close Yakima Training Center facility |url=http://seattletimes.com/html/localnews/2020713369_listeningpostxml.html |work=[[The Seattle Times]] |access-date=31 January 2014 |date=4 April 2013 |url-status=dead |archive-url=https://web.archive.org/web/20140219144524/http://seattletimes.com/html/localnews/2020713369_listeningpostxml.html |archive-date=19 February 2014 }}</ref>
| '''JACKKNIFE'''<ref name="pri">{{cite web|title=Eyes Wide Open |url=https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/eyes_wide_open_v1.pdf |publisher=[[Privacy International]] |access-date=31 January 2014 |page=11 |url-status=dead |archive-url=https://web.archive.org/web/20140106052052/https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/eyes_wide_open_v1.pdf |archive-date= 6 January 2014 }}</ref>
| JACKKNIFE<ref name="pri">{{cite web|title=Eyes Wide Open |url=https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/eyes_wide_open_v1.pdf |publisher=[[Privacy International]] |access-date=31 January 2014 |page=11 |url-status=dead |archive-url=https://web.archive.org/web/20140106052052/https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/eyes_wide_open_v1.pdf |archive-date= 6 January 2014 }}</ref>
|-
|-
| [[Sábana Seca|Sábana Seca, Puerto Rico]]
| [[Sábana Seca|Sábana Seca, Puerto Rico]]
|
|
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="globo1"/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name="globo1"/>
| '''CORALINE'''<ref name=pri/>
| CORALINE<ref name=pri/>
|-
|-
!colspan="4" style="background: #faccaa;"|Operated Jointly with the United States (2nd party)
!colspan="4" style="background: #faccaa;"|Operated Jointly with the United States (2nd party)
Line 109: Line 109:
|
|
* {{flagicon|Australia}} [[Australian Signals Directorate|ASD]]<ref name="stellar"/>
* {{flagicon|Australia}} [[Australian Signals Directorate|ASD]]<ref name="stellar"/>
| '''STELLAR'''<ref name="stellar">{{cite news|last=Dorling|first=Philip|title=Singapore, South Korea revealed as Five Eyes spying partners|url=http://www.smh.com.au/technology/technology-news/singapore-south-korea-revealed-as-five-eyes-spying-partners-20131124-2y433.html|work=[[The Sydney Morning Herald]]|access-date=30 January 2014|archive-url=https://web.archive.org/web/20140131141750/http://www.smh.com.au/technology/technology-news/singapore-south-korea-revealed-as-five-eyes-spying-partners-20131124-2y433.html|archive-date=31 January 2014|url-status=live}}</ref>
| STELLAR<ref name="stellar">{{cite news|last=Dorling|first=Philip|title=Singapore, South Korea revealed as Five Eyes spying partners|url=http://www.smh.com.au/technology/technology-news/singapore-south-korea-revealed-as-five-eyes-spying-partners-20131124-2y433.html|work=[[The Sydney Morning Herald]]|access-date=30 January 2014|archive-url=https://web.archive.org/web/20140131141750/http://www.smh.com.au/technology/technology-news/singapore-south-korea-revealed-as-five-eyes-spying-partners-20131124-2y433.html|archive-date=31 January 2014|url-status=live}}</ref>
|-
|-
| [[Shoal Bay Receiving Station|Darwin, NT]]
| [[Shoal Bay Receiving Station|Darwin, NT]]
|
|
* {{flagicon|Australia}} [[Australian Signals Directorate|ASD]]<ref name="stellar"/>
* {{flagicon|Australia}} [[Australian Signals Directorate|ASD]]<ref name="stellar"/>
|'''SHOAL BAY<ref name="stellar" />'''
|SHOAL BAY<ref name="stellar" />
|-
|-
| {{flag|New Zealand}}
| {{flag|New Zealand}}
Line 120: Line 120:
|
|
* {{flagicon|New Zealand}} [[Government Communications Security Bureau|GCSB]]<ref name="stellar"/>
* {{flagicon|New Zealand}} [[Government Communications Security Bureau|GCSB]]<ref name="stellar"/>
| '''IRONSAND'''<ref name="stellar"/>
| IRONSAND<ref name="stellar"/>
|-
|-
| {{flag|United Kingdom}}
| {{flag|United Kingdom}}
Line 127: Line 127:
* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name="100fund">{{cite web|first1=Nick|last1=Hopkins|first2=Julian|last2=Borger|title=Exclusive: NSA pays £100m in secret funding for GCHQ|url=https://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden|work=[[The Guardian]]|access-date=31 January 2014|date=1 August 2013|archive-url=https://web.archive.org/web/20140125143605/http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden|archive-date=25 January 2014|url-status=live}}</ref>
* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name="100fund">{{cite web|first1=Nick|last1=Hopkins|first2=Julian|last2=Borger|title=Exclusive: NSA pays £100m in secret funding for GCHQ|url=https://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden|work=[[The Guardian]]|access-date=31 January 2014|date=1 August 2013|archive-url=https://web.archive.org/web/20140125143605/http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden|archive-date=25 January 2014|url-status=live}}</ref>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name=100fund/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name=100fund/>
| '''CARBOY'''<ref name="carboy">{{cite news|first1=Laura|last1=Poitras|first2=Marcel|last2=Rosenbach|first3=Holger|last3=Stark|title=Friendly Fire: How GCHQ Monitors Germany, Israel and the EU|url=http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html|work=[[Der Spiegel]]|date=20 December 2013|access-date=31 January 2014|archive-url=https://web.archive.org/web/20140125102046/http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html|archive-date=25 January 2014|url-status=live}}</ref>
| CARBOY<ref name="carboy">{{cite news|first1=Laura|last1=Poitras|first2=Marcel|last2=Rosenbach|first3=Holger|last3=Stark|title=Friendly Fire: How GCHQ Monitors Germany, Israel and the EU|url=http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html|work=[[Der Spiegel]]|date=20 December 2013|access-date=31 January 2014|archive-url=https://web.archive.org/web/20140125102046/http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html|archive-date=25 January 2014|url-status=live}}</ref>
|-
|-
| {{flag|Cyprus}}
| {{flag|Cyprus}}
Line 134: Line 134:
*  {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name=100fund/>
*  {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name=100fund/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name=100fund/>
* {{flagicon|United States}} [[National Security Agency|NSA]]<ref name=100fund/>
| '''SOUNDER'''<ref>{{cite news|last=Squires|first=Nick|title=British military base in Cyprus 'used to spy on Middle East'|url=https://www.telegraph.co.uk/news/worldnews/europe/cyprus/10427890/British-military-base-in-Cyprus-used-to-spy-on-Middle-East.html|work=[[The Daily Telegraph]]|access-date=31 January 2014|date=5 November 2013|location=London|archive-url=https://web.archive.org/web/20160402232938/http://www.telegraph.co.uk/news/worldnews/europe/cyprus/10427890/British-military-base-in-Cyprus-used-to-spy-on-Middle-East.html|archive-date=2 April 2016|url-status=live}}</ref>
| SOUNDER<ref>{{cite news|last=Squires|first=Nick|title=British military base in Cyprus 'used to spy on Middle East'|url=https://www.telegraph.co.uk/news/worldnews/europe/cyprus/10427890/British-military-base-in-Cyprus-used-to-spy-on-Middle-East.html|work=[[The Daily Telegraph]]|access-date=31 January 2014|date=5 November 2013|location=London|archive-url=https://web.archive.org/web/20160402232938/http://www.telegraph.co.uk/news/worldnews/europe/cyprus/10427890/British-military-base-in-Cyprus-used-to-spy-on-Middle-East.html|archive-date=2 April 2016|url-status=live}}</ref>
|-
|-
| {{flag|Kenya}}
| {{flag|Kenya}}
Line 140: Line 140:
|
|
* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name="stellar"/>
* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name="stellar"/>
| '''SCAPEL'''<ref name=pri/>
| SCAPEL<ref name=pri/>
|-
|-
| {{flag|Oman}}
| {{flag|Oman}}
Line 146: Line 146:
|
|
* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name="stellar"/>
* {{flagicon|United Kingdom}} [[Government Communications Headquarters|GCHQ]]<ref name="stellar"/>
| '''SNICK'''<ref name=pri/>
| SNICK<ref name=pri/>
|}
|}


Line 152: Line 152:


=== Public disclosures (1972–2000) ===
=== Public disclosures (1972–2000) ===
Former NSA analyst [[Perry Fellwock]], under the pseudonym Winslow Peck, first blew the whistle on ECHELON to ''[[Ramparts (magazine)|Ramparts]]'' in 1972,<ref>{{cite journal |journal=Ramparts |volume=11 |number=2 |date=August 1972 |pages=35–50 |title=U.S. Electronic Espionage: A Memoir |author=David Horowitz }}</ref> when he revealed the existence of a global network of listening posts and told of his experiences working there. He also revealed the existence of [[Nuclear weapons and Israel | nuclear weapons in Israel]] in 1972, the widespread involvement of [[CIA]] and NSA personnel in drugs and human smuggling, and CIA operatives leading Nationalist Chinese (Taiwan) commandos in burning villages inside [[PRC]] borders.<ref>{{cite web|url=http://cryptome.org/jya/nsa-elint.htm|title=Ramparts interview|date=1988|access-date=21 April 2017|publisher=Cryptome archive|archive-url=https://web.archive.org/web/20160303235626/http://www.cryptome.org/jya/nsa-elint.htm|archive-date=3 March 2016|url-status=live}}</ref>
Former NSA analyst [[Perry Fellwock]], under the pseudonym Winslow Peck, first blew the whistle on ECHELON to ''[[Ramparts (magazine)|Ramparts]]'' in 1972,<ref>{{cite journal |journal=Ramparts |volume=11 |number=2 |date=August 1972 |pages=35–50 |title=U.S. Electronic Espionage: A Memoir |author=David Horowitz }}</ref> when he revealed the existence of a global network of listening posts and told of his experiences working there. He also revealed the existence of [[nuclear weapons in Israel]] in 1972, the widespread involvement of [[CIA]] and NSA personnel in drugs and human smuggling, and CIA operatives leading Nationalist Chinese (Taiwan) commandos in burning villages inside [[PRC]] borders.<ref>{{cite web |url=http://cryptome.org/jya/nsa-elint.htm |title=Ramparts interview |date=1988 |access-date=21 April 2017 |publisher=Cryptome archive |archive-url=https://web.archive.org/web/20160303235626/http://www.cryptome.org/jya/nsa-elint.htm |archive-date=3 March 2016 |url-status=live}}</ref>


In 1982, investigative journalist and author [[James Bamford]] wrote ''[[The Puzzle Palace]]'', an in-depth history of the NSA and its practices, which notably leaked the existence of the eavesdropping operation [[Project SHAMROCK]]. Project SHAMROCK ran from 1945 to 1975, after which it evolved into ECHELON.<ref>{{cite book |last=Bamford |first=James |title=The Puzzle Palace: A Report on America's Most Secret Agency |url=https://archive.org/details/puzzlepalacerepo00bamf |url-access=registration |publisher=Houghton Mifflin |isbn=978-0-14-006748-4 |date=1982}}</ref><ref name="Echelon reference timeline">{{cite web|url=http://cryptome.org/jya/echelon-dc.htm|title=Puzzle Palace excepts|access-date=21 April 2017|publisher=Cryptome archive|archive-url=https://web.archive.org/web/20170419125834/https://cryptome.org/jya/echelon-dc.htm|archive-date=19 April 2017|url-status=live}}</ref>
In 1982, investigative journalist and author [[James Bamford]] wrote ''[[The Puzzle Palace]]'', an in-depth history of the NSA and its practices, which notably leaked the existence of the eavesdropping operation [[Project SHAMROCK]]. Project SHAMROCK ran from 1945 to 1975, after which it evolved into ECHELON.<ref>{{cite book |last=Bamford |first=James |title=The Puzzle Palace: A Report on America's Most Secret Agency |url=https://archive.org/details/puzzlepalacerepo00bamf |url-access=registration |publisher=Houghton Mifflin |isbn=978-0-14-006748-4 |date=1982}}</ref><ref name="Echelon reference timeline">{{cite web |url=http://cryptome.org/jya/echelon-dc.htm |title=Puzzle Palace excepts |access-date=21 April 2017 |publisher=Cryptome archive |archive-url=https://web.archive.org/web/20170419125834/https://cryptome.org/jya/echelon-dc.htm |archive-date=19 April 2017 |url-status=live}}</ref>


In 1988, Margaret Newsham, a [[Lockheed Corporation|Lockheed]] employee under NSA contract, disclosed the ECHELON [[surveillance]] system to members of Congress. Newsham told a member of the [[US Congress]] that the telephone calls of [[Strom Thurmond]], a [[Republican Party (United States)|Republican]] US senator, were being collected by the NSA. Congressional investigators determined that "targeting of US political figures would not occur by accident, but was designed into the system from the start."<ref name="duncan1" />
In 1988, Margaret Newsham, a [[Lockheed Corporation|Lockheed]] employee under NSA contract, disclosed the ECHELON [[surveillance]] system to members of Congress. Newsham told a member of the [[US Congress]] that the telephone calls of [[Strom Thurmond]], a [[Republican Party (United States)|Republican]] US senator, were being collected by the NSA. Congressional investigators determined that "targeting of US political figures would not occur by accident, but was designed into the system from the start".<ref name="duncan1" />


Also in 1988, an article titled "Somebody's Listening", written by investigative journalist [[Duncan Campbell (journalist, born 1952)|Duncan Campbell]] in the ''[[New Statesman]]'', described the [[signals intelligence]] gathering activities of a program code-named "ECHELON".<ref name="duncan1">{{cite news |last=Campbell |first=Duncan |author-link=Duncan Campbell (journalist, born 1952) |title=Somebody's Listening |newspaper=[[New Statesman]] |date=12 August 1988 |url=http://www.duncancampbell.org/menu/journalism/newstatesman/newstatesman-1988/They%27ve%20got%20it%20taped.pdf |access-date=27 November 2013 |archive-url=https://web.archive.org/web/20130614020755/http://www.duncancampbell.org/menu/journalism/newstatesman/newstatesman-1988/They%27ve%20got%20it%20taped.pdf |archive-date=14 June 2013 |url-status=dead }}</ref> Bamford described the system as the software controlling the collection and distribution of civilian [[telecommunications]] traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.<ref name="Bamford">{{cite book |last=Bamford |first=James |title=Body of Secrets |publisher=Anchor |isbn=978-0-385-49908-8 |date=2002 |url-access=registration |url=https://archive.org/details/bodyofsecretsana0000bamf }}</ref>
Also in 1988, an article titled "Somebody's Listening", written by investigative journalist [[Duncan Campbell (journalist, born 1952)|Duncan Campbell]] in the ''[[New Statesman]]'', described the [[signals intelligence]] gathering activities of a program code-named "ECHELON".<ref name="duncan1">{{cite news |last=Campbell |first=Duncan |author-link=Duncan Campbell (journalist, born 1952) |title=Somebody's Listening |newspaper=[[New Statesman]] |date=12 August 1988 |url=http://www.duncancampbell.org/menu/journalism/newstatesman/newstatesman-1988/They%27ve%20got%20it%20taped.pdf |access-date=27 November 2013 |archive-url=https://web.archive.org/web/20130614020755/http://www.duncancampbell.org/menu/journalism/newstatesman/newstatesman-1988/They%27ve%20got%20it%20taped.pdf |archive-date=14 June 2013 |url-status=dead }}</ref> Bamford described the system as the software controlling the collection and distribution of civilian [[telecommunications]] traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.<ref name="Bamford">{{cite book |last=Bamford |first=James |title=Body of Secrets |publisher=Anchor |isbn=978-0-385-49908-8 |date=2002 |url-access=registration |url=https://archive.org/details/bodyofsecretsana0000bamf }}</ref>


A detailed description of ECHELON was provided by the New Zealand journalist [[Nicky Hager]] in his 1996 book ''[[Nicky Hager#Secret Power|Secret Power: New Zealand's Role in the International Spy Network]]''.<ref name="heiseeche">{{cite web|first=Duncan|last=Campbell|title=Echelon Chronology|url=http://www.heise.de/tp/artikel/7/7795/1.html|publisher=[[Heise Online]]|access-date=19 December 2013|date=1 June 2001|archive-url=https://web.archive.org/web/20131221183720/http://www.heise.de/tp/artikel/7/7795/1.html|archive-date=21 December 2013|url-status=live}}</ref> Two years later, Hager's book was cited by the [[European Parliament]] in a report titled "An Appraisal of the Technology of Political Control" (PE 168.184).<ref>{{cite web|last=Wright|first=Steve|title=An Appraisal of Technologies of Political Control|url=http://www.europarl.europa.eu/pdf/jadis/2013_12/8.PE4_AP_PV!LIBE.1994_LIBE-199801260050EN.pdf|publisher=[[European Parliament]]|access-date=28 January 2014|date=6 January 1998|archive-url=https://web.archive.org/web/20140218220150/http://www.europarl.europa.eu/pdf/jadis/2013_12/8.PE4_AP_PV!LIBE.1994_LIBE-199801260050EN.pdf|archive-date=18 February 2014|url-status=live}}</ref>
A detailed description of ECHELON was provided by the New Zealand journalist [[Nicky Hager]] in his 1996 book ''[[Nicky Hager#Secret Power|Secret Power: New Zealand's Role in the International Spy Network]]''.<ref name="heiseeche">{{cite web |first=Duncan |last=Campbell |title=Echelon Chronology |url=http://www.heise.de/tp/artikel/7/7795/1.html |publisher=[[Heise Online]] |access-date=19 December 2013 |date=1 June 2001 |archive-url=https://web.archive.org/web/20131221183720/http://www.heise.de/tp/artikel/7/7795/1.html |archive-date=21 December 2013 |url-status=live}}</ref> Two years later, Hager's book was cited by the [[European Parliament]] in a report titled "An Appraisal of the Technology of Political Control" (PE&nbsp;168.184).<ref>{{cite web |last=Wright |first=Steve |title=An Appraisal of Technologies of Political Control |url=http://www.europarl.europa.eu/pdf/jadis/2013_12/8.PE4_AP_PV!LIBE.1994_LIBE-199801260050EN.pdf |publisher=[[European Parliament]] |access-date=28 January 2014 |date=6 January 1998 |archive-url=https://web.archive.org/web/20140218220150/http://www.europarl.europa.eu/pdf/jadis/2013_12/8.PE4_AP_PV!LIBE.1994_LIBE-199801260050EN.pdf |archive-date=18 February 2014 |url-status=live}}</ref>


In March 1999, for the first time in history, the [[Australian government]] admitted that news reports about the top secret [[UKUSA Agreement]] were true.<ref name="zdnetduncan" /> Martin Brady, the director of Australia's [[Defence Signals Directorate]] (DSD, now known as Australian Signals Directorate, or ASD) told the Australian broadcasting channel [[Nine Network]] that the DSD "does co-operate with counterpart [[signals intelligence]] organisations overseas under the [[UKUSA Agreement|UKUSA relationship]]."<ref>{{cite web|first1=Duncan|last1=Campbell|first2=Mark|last2=Honigsbaum|title=Britain and US spy on world|url=https://www.theguardian.com/uk/1999/may/23/duncancampbell.markhonigsbaum|work=[[The Observer]]|access-date=19 December 2013|date=23 May 1999|archive-url=https://web.archive.org/web/20131219063144/http://www.theguardian.com/uk/1999/may/23/duncancampbell.markhonigsbaum|archive-date=19 December 2013|url-status=live}}</ref>
In March 1999, for the first time in history, the [[Australian government]] admitted that news reports about the top-secret [[UKUSA Agreement]] were true.<ref name="zdnetduncan" /> Martin Brady, the director of Australia's [[Defence Signals Directorate]] (DSD, now known as Australian Signals Directorate, or ASD) told the Australian broadcasting channel [[Nine Network]] that the DSD "does co-operate with counterpart [[signals intelligence]] organisations overseas under the [[UKUSA Agreement|UKUSA relationship]]".<ref>{{cite web |first1=Duncan |last1=Campbell| first2=Mark |last2=Honigsbaum |title=Britain and US spy on world |url=https://www.theguardian.com/uk/1999/may/23/duncancampbell.markhonigsbaum |work=[[The Observer]] |access-date=19 December 2013 |date=23 May 1999 |archive-url=https://web.archive.org/web/20131219063144/http://www.theguardian.com/uk/1999/may/23/duncancampbell.markhonigsbaum |archive-date=19 December 2013 |url-status=live}}</ref>


In 2000, [[R. James Woolsey, Jr.|James Woolsey]], the former Director of the US [[Central Intelligence Agency]], confirmed that US intelligence uses interception systems and keyword searches to monitor [[Europe|European]] businesses.<ref>{{cite news|author=R. James Woolsey|title=Why We Spy on Our Allies|url=https://www.wsj.com/articles/SB95326824311657269|work=[[The Wall Street Journal]]|date=17 March 2000|access-date=3 August 2017|archive-url=https://web.archive.org/web/20170709151210/https://www.wsj.com/articles/SB95326824311657269|archive-date=9 July 2017|url-status=live}}</ref>
In 2000, [[R. James Woolsey, Jr.|James Woolsey]], the former Director of the US [[Central Intelligence Agency]], confirmed that US intelligence uses interception systems and keyword searches to monitor [[Europe]]an businesses.<ref>{{cite news |author=R. James Woolsey |title=Why We Spy on Our Allies |url=https://www.wsj.com/articles/SB95326824311657269 |work=[[The Wall Street Journal]] |date=17 March 2000 |access-date=3 August 2017 |archive-url=https://web.archive.org/web/20170709151210/https://www.wsj.com/articles/SB95326824311657269 |archive-date=9 July 2017 |url-status=live}}</ref>


Lawmakers in the United States feared that the ECHELON system could be used to monitor US citizens.<ref name="echenytimes" /> According to ''[[The New York Times]]'', the ECHELON system has been "shrouded in such secrecy that its very existence has been difficult to prove."<ref name="echenytimes">{{cite news|author=Niall McKay|title=Lawmakers Raise Questions About International Spy Network|url=https://www.nytimes.com/library/tech/99/05/cyber/articles/27network.html|work=[[The New York Times]]|access-date=19 December 2013|date=27 May 1999|archive-url=https://web.archive.org/web/20130130111338/http://www.nytimes.com/library/tech/99/05/cyber/articles/27network.html|archive-date=30 January 2013|url-status=live}}</ref> Critics said the ECHELON system emerged from the [[Cold War]] as a "Big Brother without a cause".<ref>{{cite news|author=Suzanne Daley|title=An Electronic Spy Scare Is Alarming Europe|url=https://www.nytimes.com/library/tech/00/02/biztech/articles/24spy.html|work=[[The New York Times]]|access-date=19 December 2013|date=24 February 2000}}</ref>
Lawmakers in the United States feared that the ECHELON system could be used to monitor US citizens.<ref name="echenytimes" /> According to ''[[The New York Times]]'', the ECHELON system has been "shrouded in such secrecy that its very existence has been difficult to prove".<ref name="echenytimes">{{cite news |author=Niall McKay |title=Lawmakers Raise Questions About International Spy Network |url=https://www.nytimes.com/library/tech/99/05/cyber/articles/27network.html |work=[[The New York Times]] |access-date=19 December 2013 |date=27 May 1999 |archive-url=https://web.archive.org/web/20130130111338/http://www.nytimes.com/library/tech/99/05/cyber/articles/27network.html |archive-date=30 January 2013 |url-status=live}}</ref> Critics said that the ECHELON system emerged from the [[Cold War]] as a "Big Brother without a cause".<ref>{{cite news |author=Suzanne Daley |title=An Electronic Spy Scare Is Alarming Europe |url=https://www.nytimes.com/library/tech/00/02/biztech/articles/24spy.html |work=[[The New York Times]] |access-date=19 December 2013 |date=24 February 2000}}</ref>


===European Parliament investigation (2000–2001)===
===European Parliament investigation (2000–2001)===
[[File:Nicky Hager at European Parliament April 2001b.jpg|thumb|The New Zealand journalist [[Nicky Hager]], who testified before the [[European Parliament]] and provided specific details about the ECHELON [[surveillance]] system<ref>{{cite web|first=Kieren|last=McCarthy|title=This is how we know Echelon exists|url=https://www.theregister.co.uk/2001/09/14/this_is_how_we_know/|work=[[The Register]]|access-date=19 December 2013|date=14 September 2001|archive-url=https://web.archive.org/web/20131209042652/http://www.theregister.co.uk/2001/09/14/this_is_how_we_know/|archive-date=9 December 2013|url-status=live}}</ref>]]
[[File:Nicky Hager at European Parliament April 2001b.jpg|thumb|The New Zealand journalist [[Nicky Hager]], who testified before the [[European Parliament]] and provided specific details about the ECHELON [[surveillance]] system<ref>{{cite web |first=Kieren |last=McCarthy |title=This is how we know Echelon exists |url=https://www.theregister.co.uk/2001/09/14/this_is_how_we_know/ |work=[[The Register]] |access-date=19 December 2013 |date=14 September 2001 |archive-url=https://web.archive.org/web/20131209042652/http://www.theregister.co.uk/2001/09/14/this_is_how_we_know/ |archive-date=9 December 2013 |url-status=live}}</ref>]]


The program's capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001.<ref name="EP"/> In July 2000, the Temporary Committee on the ECHELON Interception System was established by the European parliament to investigate the [[surveillance]] network.<ref>{{Cite journal|last=Rudner|first=Martin|title=Britain betwixt and between: UK SIGINT alliance strategy's transatlantic and European connections|journal=Intelligence & National Security}}</ref> It was chaired by the Portuguese politician [[Carlos Coelho (politician)|Carlos Coelho]], who was in charge of supervising investigations throughout 2000 and 2001.
The program's capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001.<ref name="EP"/> In July 2000, the Temporary Committee on the ECHELON Interception System was established by the European parliament to investigate the [[surveillance]] network.<ref>{{Cite journal |last=Rudner |first=Martin |title=Britain betwixt and between: UK SIGINT alliance strategy's transatlantic and European connections |journal=Intelligence & National Security}}</ref> It was chaired by the Portuguese politician [[Carlos Coelho (politician)|Carlos Coelho]], who was in charge of supervising investigations throughout 2000 and 2001.


In May 2001, as the committee finalised its report on the ECHELON system, a delegation travelled to [[Washington, D.C.]] to attend meetings with US officials from the following agencies and departments:
In May 2001, as the committee finalised its report on the ECHELON system, a delegation travelled to [[Washington, D.C.]] to attend meetings with US officials from the following agencies and departments:
Line 178: Line 178:
* US National Security Agency (NSA)<ref name="bbcusech"/>
* US National Security Agency (NSA)<ref name="bbcusech"/>


All meetings were cancelled by the US government and the committee was forced to end its trip prematurely.<ref name="bbcusech">{{cite news|last=Roxburgh|first=Angus|title=EU investigators 'snubbed' in US|url=http://news.bbc.co.uk/2/hi/europe/1325186.stm|publisher=[[BBC]]|access-date=28 January 2014|date=11 May 2001|archive-url=https://web.archive.org/web/20140203035200/http://news.bbc.co.uk/2/hi/europe/1325186.stm|archive-date=3 February 2014|url-status=live}}</ref> According to a [[BBC]] correspondent in May 2001, "The US Government still refuses to admit that Echelon even exists."<ref name="bbcechelon1"/>
All meetings were cancelled by the US government, and the committee was forced to end its trip prematurely.<ref name="bbcusech">{{cite news |last=Roxburgh |first=Angus |title=EU investigators 'snubbed' in US |url=https://news.bbc.co.uk/2/hi/europe/1325186.stm |publisher=[[BBC]] |access-date=28 January 2014 |date=11 May 2001 |archive-url=https://web.archive.org/web/20140203035200/http://news.bbc.co.uk/2/hi/europe/1325186.stm |archive-date=3 February 2014 |url-status=live}}</ref> According to a [[BBC]] correspondent in May 2001, "The US Government still refuses to admit that Echelon even exists."<ref name="bbcechelon1"/>


In July 2001, the Committee released its final report.<ref name="EUechelon">{{cite web|title=Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))|url=http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN|publisher=[[European Parliament]]|date=11 July 2001|access-date=10 September 2013|archive-url=https://web.archive.org/web/20130921163352/http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN|archive-date=21 September 2013|url-status=live}}</ref> The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.<ref name="EP" /> On 5 September 2001, the European parliament voted to accept the report.<ref name="apechelonusa">{{cite news|title=Report: Echelon exists, should be guarded against|url=http://usatoday30.usatoday.com/tech/news/2001-09-05-echelon.htm|access-date=7 February 2014|newspaper=[[USA Today]]|date=5 September 2001|agency=[[Associated Press]]|archive-url=https://web.archive.org/web/20140221065509/http://usatoday30.usatoday.com/tech/news/2001-09-05-echelon.htm|archive-date=21 February 2014|url-status=live}}</ref>  
In July 2001, the Committee released its final report.<ref name="EUechelon">{{cite web |title=Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)) |url=http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN |publisher=[[European Parliament]] |date=11 July 2001 |access-date=10 September 2013 |archive-url=https://web.archive.org/web/20130921163352/http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN |archive-date=21 September 2013 |url-status=live}}</ref> The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.<ref name="EP" /> On 5&nbsp;September 2001, the European parliament voted to accept the report.<ref name="apechelonusa">{{cite news |title=Report: Echelon exists, should be guarded against |url=http://usatoday30.usatoday.com/tech/news/2001-09-05-echelon.htm |access-date=7 February 2014 |newspaper=[[USA Today]] |date=5 September 2001 |agency=[[Associated Press]] |archive-url=https://web.archive.org/web/20140221065509/http://usatoday30.usatoday.com/tech/news/2001-09-05-echelon.htm |archive-date=21 February 2014 |url-status=live}}</ref>  


The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system.<ref name="EP" /> The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, [[public switched telephone network]]s (which once carried most Internet traffic), and [[microwave]] links.<ref name=EP/>  
The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system.<ref name="EP" /> The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers, including satellite transmission, [[public switched telephone network]]s (which once carried most Internet traffic), and [[microwave]] links.<ref name=EP/>


=== Confirmation of ECHELON (2015) ===
=== Confirmation of ECHELON (2015) ===
Line 188: Line 188:
* TRANSIENT: for intercepting [[Soviet Union|Soviet]] satellite transmissions
* TRANSIENT: for intercepting [[Soviet Union|Soviet]] satellite transmissions
* ECHELON: for intercepting [[Intelsat]] satellite transmissions  
* ECHELON: for intercepting [[Intelsat]] satellite transmissions  
The [[European Parliament]]'s [[Temporary Committee on the ECHELON Interception System]] stated, "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact '''ECHELON''', although this is a relatively minor detail".<ref name="EP" /> The US intelligence community uses many code names (''see'', for example, [[CIA cryptonym]]).
The [[European Parliament]]'s [[Temporary Committee on the ECHELON Interception System]] stated, "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail".<ref name="EP" /> The US intelligence community uses many code names (''see'', for example, [[CIA cryptonym]]).


Former NSA employee [[Margaret Newsham]] said that she worked on the configuration and installation of software that makes up the ECHELON system while employed at [[Lockheed Martin]], from 1974 to 1984 in [[Sunnyvale, California]], in the [[United States]], and in [[Menwith Hill]], [[England]], in the [[UK]].<ref>{{Cite news |last1=Elkjær |first1=Bo |first2=Kenan |last2=Seeberg |date=17 November 1999 |title=ECHELON Was My Baby |work=Ekstra Bladet |url=http://cryptome.org/echelon-baby.htm |url-status=dead |access-date=17 May 2006 |archive-url=https://web.archive.org/web/20060615202141/http://cryptome.org/echelon-baby.htm |archive-date=15 June 2006}} "Unfortunately, I can't tell you all my duties. I am still bound by professional secrecy, and I would hate to go to prison or get involved in any trouble, if you know what I mean. In general, I can tell you that I was responsible for compiling the various systems and programs, configuring the whole thing and making it operational on mainframes"; "[[Margaret Newsham]] worked for the [[NSA]] through her employment at Ford and Lockheed from 1974 to 1984. In 1977 and 1978 Newsham was stationed at the largest listening post in the world at [[Menwith Hill]], [[England]] ... Ekstra Bladet has Margaret Newsham's stationing orders from the US Department of Defense. She possessed the high security classification TOP SECRET CRYPTO."</ref> At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called it ''P415''. The software programs were called ''SILKWORTH'' and ''SIRE''. A [[satellite]] named ''[[Vortex (satellite)|VORTEX]]'' intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.<ref>{{cite news |last=Goodwins |first=Rupert |date=29 June 2000 |title=Echelon: How it works |work=[[ZDNet]] |url=https://www.zdnet.com/article/echelon-how-it-works/ |url-status=live |access-date=28 January 2014 |archive-url=https://web.archive.org/web/20140202120330/http://www.zdnet.com/echelon-how-it-works-3002079849/ |archive-date=2 February 2014}}</ref><ref name="insideechelon">{{cite web |last=Campbell |first=Duncan |date=25 July 2000 |title=Inside Echelon |url=https://www.zdnet.com/article/echelon-how-it-works/ |url-status=live |archive-url=https://web.archive.org/web/20140202120330/http://www.zdnet.com/echelon-how-it-works-3002079849/ |archive-date=2 February 2014 |access-date=28 January 2014 |publisher=[[Heise Online]]}}</ref>
Former NSA employee [[Margaret Newsham]] said that she worked on the configuration and installation of software that makes up the ECHELON system while employed at [[Lockheed Martin]], from 1974 to 1984 in [[Sunnyvale, California]], in the [[United States]], and in [[Menwith Hill]], [[England]], in the [[UK]].<ref>{{Cite news |last1=Elkjær |first1=Bo |first2=Kenan |last2=Seeberg |date=17 November 1999 |title=ECHELON Was My Baby |work=Ekstra Bladet |url=http://cryptome.org/echelon-baby.htm |url-status=dead |access-date=17 May 2006 |archive-url=https://web.archive.org/web/20060615202141/http://cryptome.org/echelon-baby.htm |archive-date=15 June 2006}} "Unfortunately, I can't tell you all my duties. I am still bound by professional secrecy, and I would hate to go to prison or get involved in any trouble, if you know what I mean. In general, I can tell you that I was responsible for compiling the various systems and programs, configuring the whole thing and making it operational on mainframes"; "[[Margaret Newsham]] worked for the [[NSA]] through her employment at Ford and Lockheed from 1974 to 1984. In 1977 and 1978 Newsham was stationed at the largest listening post in the world at [[Menwith Hill]], [[England]] ... Ekstra Bladet has Margaret Newsham's stationing orders from the US Department of Defense. She possessed the high security classification TOP SECRET CRYPTO."</ref> At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called it ''P415''. The software programs were called ''SILKWORTH'' and ''SIRE''. A [[satellite]] named ''[[Vortex (satellite)|VORTEX]]'' intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.<ref>{{cite news |last=Goodwins |first=Rupert |date=29 June 2000 |title=Echelon: How it works |work=[[ZDNet]] |url=https://www.zdnet.com/article/echelon-how-it-works/ |url-status=live |access-date=28 January 2014 |archive-url=https://web.archive.org/web/20140202120330/http://www.zdnet.com/echelon-how-it-works-3002079849/ |archive-date=2 February 2014}}</ref><ref name="insideechelon">{{cite web |last=Campbell |first=Duncan |date=25 July 2000 |title=Inside Echelon |url=https://www.zdnet.com/article/echelon-how-it-works/ |url-status=live |archive-url=https://web.archive.org/web/20140202120330/http://www.zdnet.com/echelon-how-it-works-3002079849/ |archive-date=2 February 2014 |access-date=28 January 2014 |publisher=[[Heise Online]]}}</ref>
Line 198: Line 198:
Officially, however, Echelon doesn't exist.<ref>{{cite web|last=Perrone|first=Jane|title=The Echelon spy network|url=https://www.theguardian.com/world/2001/may/29/qanda.janeperrone|work=[[The Guardian]]|access-date=28 January 2014|date=29 May 2001|archive-url=https://web.archive.org/web/20140203163847/http://www.theguardian.com/world/2001/may/29/qanda.janeperrone|archive-date=3 February 2014|url-status=live}}</ref>}}
Officially, however, Echelon doesn't exist.<ref>{{cite web|last=Perrone|first=Jane|title=The Echelon spy network|url=https://www.theguardian.com/world/2001/may/29/qanda.janeperrone|work=[[The Guardian]]|access-date=28 January 2014|date=29 May 2001|archive-url=https://web.archive.org/web/20140203163847/http://www.theguardian.com/world/2001/may/29/qanda.janeperrone|archive-date=3 February 2014|url-status=live}}</ref>}}


Documents leaked by the former NSA contractor [[Edward Snowden]] revealed that the ECHELON system's collection of satellite data is also referred to as '''FORNSAT''' - an abbreviation for "Foreign Satellite Collection".<ref>{{cite news |first1=Laura|last1=Poitras|first2=Marcel|last2=Rosenbach|first3=Holger|last3=Stark |date=20 December 2013 |title=Friendly Fire: How GCHQ Monitors Germany, Israel and the EU |work=[[Der Spiegel]] |url=http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html |url-status=live |access-date=30 January 2014 |archive-url=https://web.archive.org/web/20140125102046/http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html |archive-date=25 January 2014 |quote=A map from the wealth of classified documents obtained by Snowden on the so-called "Fornsat" activities of the technical intelligence cooperation program -- informally known as the Five Eyes -- shows that the system of global satellite surveillance remained in operation.}}</ref><ref>{{cite web |last=Ambinder |first=Marc |date=31 July 2013 |title=What's XKEYSCORE? |url=http://theweek.com/article/index/247684/whats-xkeyscore |url-status=live |archive-url=https://web.archive.org/web/20140130064739/http://theweek.com/article/index/247684/whats-xkeyscore |archive-date=30 January 2014 |access-date=30 January 2014 |work=[[The Week]] |quote=FORNSAT simply means "foreign satellite collection," which refers to NSA tapping into satellites that process data used by other countries.}}</ref>
Documents leaked by the former NSA contractor [[Edward Snowden]] revealed that the ECHELON system's collection of satellite data is also referred to as FORNSAT - an abbreviation for "Foreign Satellite Collection".<ref>{{cite news |first1=Laura|last1=Poitras|first2=Marcel|last2=Rosenbach|first3=Holger|last3=Stark |date=20 December 2013 |title=Friendly Fire: How GCHQ Monitors Germany, Israel and the EU |work=[[Der Spiegel]] |url=http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html |url-status=live |access-date=30 January 2014 |archive-url=https://web.archive.org/web/20140125102046/http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html |archive-date=25 January 2014 |quote=A map from the wealth of classified documents obtained by Snowden on the so-called "Fornsat" activities of the technical intelligence cooperation program -- informally known as the Five Eyes -- shows that the system of global satellite surveillance remained in operation.}}</ref><ref>{{cite web |last=Ambinder |first=Marc |date=31 July 2013 |title=What's XKEYSCORE? |url=http://theweek.com/article/index/247684/whats-xkeyscore |url-status=live |archive-url=https://web.archive.org/web/20140130064739/http://theweek.com/article/index/247684/whats-xkeyscore |archive-date=30 January 2014 |access-date=30 January 2014 |work=[[The Week]] |quote=FORNSAT simply means "foreign satellite collection," which refers to NSA tapping into satellites that process data used by other countries.}}</ref>


==Intercept stations==
==Intercept stations==
Line 221: Line 221:
* [[Bad Aibling Station]] ([[Bad Aibling]], Germany – US)
* [[Bad Aibling Station]] ([[Bad Aibling]], Germany – US)
** relocated to [[Griesheim (Hesse)|Griesheim]]/[[Darmstadt]] in 2004.<ref>According to a statement by Terence Dudlee, the speaker of the US Navy in London, in an interview to the German HR ([[Hessischer Rundfunk]])<br />{{cite web |url=http://www6.hr-online.de/website/rubriken/nachrichten/index.jsp?rubrik=5710&key=standard_document_2406678 |archive-url=https://archive.today/20070630004752/http://www6.hr-online.de/website/rubriken/nachrichten/index.jsp?rubrik=5710&key=standard_document_2406678 |archive-date=30 June 2007 |title=US-Armee lauscht von Darmstadt aus |url-status=dead |access-date=19 August 2016}} (German), ''[[Hessischer Rundfunk|hr online]]'', 1 October 2004</ref>
** relocated to [[Griesheim (Hesse)|Griesheim]]/[[Darmstadt]] in 2004.<ref>According to a statement by Terence Dudlee, the speaker of the US Navy in London, in an interview to the German HR ([[Hessischer Rundfunk]])<br />{{cite web |url=http://www6.hr-online.de/website/rubriken/nachrichten/index.jsp?rubrik=5710&key=standard_document_2406678 |archive-url=https://archive.today/20070630004752/http://www6.hr-online.de/website/rubriken/nachrichten/index.jsp?rubrik=5710&key=standard_document_2406678 |archive-date=30 June 2007 |title=US-Armee lauscht von Darmstadt aus |url-status=dead |access-date=19 August 2016}} (German), ''[[Hessischer Rundfunk|hr online]]'', 1 October 2004</ref>
* [[Fort Eisenhower]] ([[Georgia (U.S. state)|Georgia]], US)
* [[Fort Gordon]] ([[Georgia (U.S. state)|Georgia]], US)
* [[CFB Gander]] ([[Newfoundland and Labrador]], Canada)<ref>{{Cite web|url=http://jproc.ca/rrp/leitrim.html|title=CFS Leitrim|access-date=16 October 2021|archive-date=16 October 2021|archive-url=https://web.archive.org/web/20211016153041/http://jproc.ca/rrp/leitrim.html|url-status=live}}</ref><ref>{{Cite web|title=canadian military history|url=https://militarybruce.com/abandoned-canadian-military-bases/the-future/newfoundland-labrador/|access-date=14 November 2020|archive-date=20 November 2020|archive-url=https://web.archive.org/web/20201120081947/https://militarybruce.com/abandoned-canadian-military-bases/the-future/newfoundland-labrador/|url-status=live}}</ref>
* [[CFB Gander]] ([[Newfoundland and Labrador]], Canada)<ref>{{Cite web|url=http://jproc.ca/rrp/leitrim.html|title=CFS Leitrim|access-date=16 October 2021|archive-date=16 October 2021|archive-url=https://web.archive.org/web/20211016153041/http://jproc.ca/rrp/leitrim.html|url-status=live}}</ref><ref>{{Cite web|title=canadian military history|url=https://militarybruce.com/abandoned-canadian-military-bases/the-future/newfoundland-labrador/|access-date=14 November 2020|archive-date=20 November 2020|archive-url=https://web.archive.org/web/20201120081947/https://militarybruce.com/abandoned-canadian-military-bases/the-future/newfoundland-labrador/|url-status=live}}</ref>
* [[Guam]] (Pacific Ocean, US)
* [[Guam]] (Pacific Ocean, US)
Line 242: Line 242:
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the [[European Parliament]] that citizens of member states routinely use [[cryptography]] in their communications to protect their privacy, because [[economic espionage]] with ECHELON has been conducted by the US intelligence agencies.<ref name = EP/>
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the [[European Parliament]] that citizens of member states routinely use [[cryptography]] in their communications to protect their privacy, because [[economic espionage]] with ECHELON has been conducted by the US intelligence agencies.<ref name = EP/>


American author [[James Bamford]] provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.<ref>{{Cite web|title=The National Security Agency Declassified|url=https://nsarchive2.gwu.edu/NSAEBB/NSAEBB24/index.htm|access-date=2020-10-31|website=nsarchive2.gwu.edu|archive-date=25 October 2020|archive-url=https://web.archive.org/web/20201025173335/https://nsarchive2.gwu.edu/NSAEBB/NSAEBB24/index.htm|url-status=live}}</ref>
American author [[James Bamford]] provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.<ref>{{Cite web |title=The National Security Agency Declassified |url=https://nsarchive2.gwu.edu/NSAEBB/NSAEBB24/index.htm |access-date=2020-10-31 |website=nsarchive2.gwu.edu |archive-date=25 October 2020 |archive-url=https://web.archive.org/web/20201025173335/https://nsarchive2.gwu.edu/NSAEBB/NSAEBB24/index.htm |url-status=live}}</ref>


In its report, the committee of the European Parliament stated categorically that the Echelon network was being used to intercept not only military communications, but also private and business ones. In its epigraph to the report, the parliamentary committee quoted [[Juvenal]], "''Sed quis custodiet ipsos custodes''.{{-"}} ("But who will watch the watchers").<ref name = EP/> James Bamford, in ''The Guardian'' in May 2001, warned that if Echelon were to continue unchecked, it could become a "cyber secret police, without courts, juries, or the right to a defence".<ref>Bustillos, Maria (9 June 2013). [http://www.newyorker.com/online/blogs/elements/2013/06/a-reflection-in-the-nsas-prism.html "Our reflection in the N.S.A.'s PRISM"] {{Webarchive|url=https://web.archive.org/web/20131014213634/http://www.newyorker.com/online/blogs/elements/2013/06/a-reflection-in-the-nsas-prism.html |date=14 October 2013 }}. ''The New Yorker''. Retrieved: 2013-10-12.</ref>
In its report, the committee of the European Parliament stated categorically that the Echelon network was being used to intercept not only military communications, but also private and business ones. In its epigraph to the report, the parliamentary committee quoted [[Juvenal]], "{{lang|la|Sed quis custodiet ipsos custodes}}" ("But who will watch the watchers").<ref name = EP/> James Bamford, in ''The Guardian'' in May 2001, warned that if Echelon were to continue unchecked, it could become a "cyber secret police, without courts, juries, or the right to a defence".<ref>Bustillos, Maria (9 June 2013). [http://www.newyorker.com/online/blogs/elements/2013/06/a-reflection-in-the-nsas-prism.html "Our reflection in the N.S.A.'s PRISM"]. {{Webarchive|url=https://web.archive.org/web/20131014213634/http://www.newyorker.com/online/blogs/elements/2013/06/a-reflection-in-the-nsas-prism.html |date=14 October 2013 }}. ''The New Yorker''. Retrieved: 2013-10-12.</ref>


Alleged examples of espionage conducted by the members of the "[[Five Eyes]]" include:
Alleged examples of espionage conducted by the members of the "[[Five Eyes]]" include:
 
* On behalf of the British [[Prime Minister of the United Kingdom|Prime Minister]] [[Margaret Thatcher]], the [[Communications Security Establishment]] allegedly spied on two British cabinet ministers in 1983.<ref>{{cite news |title=Thatcher 'spied on ministers' |url=https://news.bbc.co.uk/2/hi/uk_news/politics/655996.stm |publisher=BBC |date=25 February 2000 |access-date=15 October 2013 |archive-url=https://web.archive.org/web/20131021015414/http://news.bbc.co.uk/2/hi/uk_news/politics/655996.stm |archive-date=21 October 2013 |url-status=live}}</ref>
* On behalf of the British [[Prime Minister of the United Kingdom|Prime Minister]] [[Margaret Thatcher]], the [[Communications Security Establishment]] allegedly spied on two British cabinet ministers in 1983.<ref>{{cite news|title=Thatcher 'spied on ministers'|url=http://news.bbc.co.uk/2/hi/uk_news/politics/655996.stm|publisher=BBC|date=25 February 2000|access-date=15 October 2013|archive-url=https://web.archive.org/web/20131021015414/http://news.bbc.co.uk/2/hi/uk_news/politics/655996.stm|archive-date=21 October 2013|url-status=live}}</ref>
* The US National Security Agency spied on and intercepted the phone calls of [[Diana, Princess of Wales]] right up until she died in a [[Death of Diana, Princess of Wales|Paris car crash with Dodi Fayed]] in 1997. The [[NSA]] currently holds 1,056 pages of information about Princess Diana, which has been classified as [[Classified information|top secret]] "because their disclosure could reasonably be expected to cause exceptionally grave damage to the [[national security]]&nbsp;... the damage would be caused not by the information about Diana, but because the documents would disclose 'sources and methods' of US intelligence gathering".<ref name="Diana01a">{{cite news |first=Vernon |last=Loeb |title=NSA Admits to Spying on Princess Diana |url=https://www.washingtonpost.com/wp-srv/national/daily/dec98/diana12.htm |newspaper=[[The Washington Post]] |date=12 December 1998 |access-date=20 September 2017 |archive-url=https://web.archive.org/web/20171109051540/https://www.washingtonpost.com/wp-srv/national/daily/dec98/diana12.htm |archive-date=9 November 2017 |url-status=live}}</ref> An official said that "the references to Diana in intercepted conversations were 'incidental{{'"}}, and she was never a "target" of the NSA eavesdropping.<ref name=Diana01a/>
* The US National Security Agency spied on and intercepted the phone calls of [[Diana, Princess of Wales]] right up until she died in a [[Death of Diana, Princess of Wales|Paris car crash with Dodi Fayed]] in 1997. The [[NSA]] currently holds 1,056 pages of classified information about [[Diana, Princess of Wales|Princess Diana]], which has been classified as [[Classified information|top secret]] "because their disclosure could reasonably be expected to cause exceptionally grave damage to the [[national security]] ... the damage would be caused not by the information about [[Diana, Princess of Wales|Diana]], but because the documents would disclose 'sources and methods' of US intelligence gathering".<ref name="Diana01a">{{cite news|first=Vernon|last=Loeb|title=NSA Admits to Spying on Princess Diana|url=https://www.washingtonpost.com/wp-srv/national/daily/dec98/diana12.htm|newspaper=[[The Washington Post]]|date=12 December 1998|access-date=20 September 2017|archive-url=https://web.archive.org/web/20171109051540/https://www.washingtonpost.com/wp-srv/national/daily/dec98/diana12.htm|archive-date=9 November 2017|url-status=live}}</ref> An official said that "the references to Diana in intercepted conversations were 'incidental'," and she was never a 'target' of the NSA eavesdropping.<ref name=Diana01a/>
* UK agents monitored the conversations of the 7th [[Secretary-General of the United Nations]], [[Kofi Annan]].<ref>{{cite news |title=UK 'spied on UN's Kofi Annan' |url=https://news.bbc.co.uk/2/hi/uk_news/politics/3488548.stm |publisher=BBC |access-date=21 September 2013 |date=26 February 2004 |archive-url=https://web.archive.org/web/20131029112154/http://news.bbc.co.uk/2/hi/uk_news/politics/3488548.stm |archive-date=29 October 2013 |url-status=live}}</ref><ref>{{cite news |first=Patrick E. |last=Tyler |title=Ex-Minister Says British Spies Bugged Kofi Annan's Office |url=https://www.nytimes.com/2004/02/26/international/europe/26CND-BRIT.html |work=[[The New York Times]] |access-date=21 September 2013 |date=26 February 2004 |archive-url=https://web.archive.org/web/20130925063926/http://www.nytimes.com/2004/02/26/international/europe/26CND-BRIT.html |archive-date=25 September 2013 |url-status=live}}</ref>
* UK agents monitored the conversations of the 7th [[Secretary-General of the United Nations]], [[Kofi Annan]].<ref>{{cite news|title=UK 'spied on UN's Kofi Annan'|url=http://news.bbc.co.uk/2/hi/uk_news/politics/3488548.stm|publisher=BBC|access-date=21 September 2013|date=26 February 2004|archive-url=https://web.archive.org/web/20131029112154/http://news.bbc.co.uk/2/hi/uk_news/politics/3488548.stm|archive-date=29 October 2013|url-status=live}}</ref><ref>{{cite news|first=Patrick E.|last=Tyler|title=Ex-Minister Says British Spies Bugged Kofi Annan's Office|url=https://www.nytimes.com/2004/02/26/international/europe/26CND-BRIT.html|work=[[The New York Times]]|access-date=21 September 2013|date=26 February 2004|archive-url=https://web.archive.org/web/20130925063926/http://www.nytimes.com/2004/02/26/international/europe/26CND-BRIT.html|archive-date=25 September 2013|url-status=live}}</ref>
* US agents gathered "detailed biometric information" on the 8th Secretary-General of the United Nations, [[Ban Ki-moon]].<ref name="clintonbankimoon">{{cite web |title=US diplomats spied on UN leadership |url=https://www.theguardian.com/world/2010/nov/28/us-embassy-cables-spying-un |work=[[The Guardian]] |date=28 November 2010 |access-date=27 August 2013 |archive-url=https://web.archive.org/web/20130910075646/http://www.theguardian.com/world/2010/nov/28/us-embassy-cables-spying-un |archive-date=10 September 2013 |url-status=live}}</ref><ref name="banspiegel">{{cite news |first1=Marcel |last1=Rosenbach |first2=Holger |last2=Stark |title=Diplomats or Spooks? How US Diplomats Were Told to Spy on UN and Ban Ki-Moon |url=http://www.spiegel.de/international/world/diplomats-or-spooks-how-us-diplomats-were-told-to-spy-on-un-and-ban-ki-moon-a-731747.html |work=[[Der Spiegel]] |date=29 November 2010 |access-date=27 August 2013 |archive-url=https://web.archive.org/web/20130821031901/http://www.spiegel.de/international/world/diplomats-or-spooks-how-us-diplomats-were-told-to-spy-on-un-and-ban-ki-moon-a-731747.html |archive-date=21 August 2013 |url-status=live}}</ref>
* US agents gathered "detailed biometric information" on the 8th Secretary-General of the United Nations, [[Ban Ki-moon]].<ref name="clintonbankimoon">{{cite web|title=US diplomats spied on UN leadership|url=https://www.theguardian.com/world/2010/nov/28/us-embassy-cables-spying-un|work=[[The Guardian]]|date=28 November 2010|access-date=27 August 2013|archive-url=https://web.archive.org/web/20130910075646/http://www.theguardian.com/world/2010/nov/28/us-embassy-cables-spying-un|archive-date=10 September 2013|url-status=live}}</ref><ref name="banspiegel">{{cite news|first1=Marcel|last1=Rosenbach|first2=Holger|last2=Stark|title=Diplomats or Spooks? How US Diplomats Were Told to Spy on UN and Ban Ki-Moon|url=http://www.spiegel.de/international/world/diplomats-or-spooks-how-us-diplomats-were-told-to-spy-on-un-and-ban-ki-moon-a-731747.html|work=[[Der Spiegel]]|date=29 November 2010|access-date=27 August 2013|archive-url=https://web.archive.org/web/20130821031901/http://www.spiegel.de/international/world/diplomats-or-spooks-how-us-diplomats-were-told-to-spy-on-un-and-ban-ki-moon-a-731747.html|archive-date=21 August 2013|url-status=live}}</ref>
* In the early 1990s, the US National Security Agency intercepted the communications between the [[Europe]]an aerospace company [[Airbus]] and the [[Saudi Arabia]]n national airline. In 1994, [[Airbus]] lost a $6&nbsp;billion contract with [[Saudi Arabia]] after the NSA, acting as a [[whistleblower]], reported that [[Airbus]] officials had been bribing [[Saudi Arabia|Saudi]] officials to secure the contract.<ref>{{cite news |url=https://news.bbc.co.uk/2/hi/europe/820758.stm |title=Echelon: Big brother without a cause |access-date=27 August 2006 |date=6 July 2000 |work=BBC News |archive-url=https://web.archive.org/web/20090107065132/http://news.bbc.co.uk/1/hi/world/europe/820758.stm |archive-date=7 January 2009 |url-status=live }}</ref> As a result, the American aerospace company [[McDonnell Douglas]] (now part of [[Boeing]]) won the multibillion-dollar contract instead of [[Airbus]].<ref>{{cite news |title=Airbus's secret past |url=https://www.economist.com/special-report/2003/06/12/airbuss-secret-past |newspaper=[[The Economist]] |access-date=15 October 2013 |date=14 June 2003 |archive-url=https://web.archive.org/web/20131021194132/http://www.economist.com/node/1842124 |archive-date=21 October 2013 |url-status=live}}</ref>
* In the early 1990s, the US National Security Agency intercepted the communications between the [[Europe]]an aerospace company [[Airbus]] and the [[Saudi Arabia]]n national airline. In 1994, [[Airbus]] lost a $6 billion contract with [[Saudi Arabia]] after the NSA, acting as a [[whistleblower]], reported that [[Airbus]] officials had been bribing [[Saudi Arabia|Saudi]] officials to secure the contract.<ref>{{cite news |url=http://news.bbc.co.uk/1/hi/world/europe/820758.stm |title=Echelon: Big brother without a cause |access-date=27 August 2006 |date=6 July 2000 |work=BBC News |archive-url=https://web.archive.org/web/20090107065132/http://news.bbc.co.uk/1/hi/world/europe/820758.stm |archive-date=7 January 2009 |url-status=live }}</ref> As a result, the American aerospace company [[McDonnell Douglas]] (now part of [[Boeing]]) won the multibillion-dollar contract instead of [[Airbus]].<ref>{{cite news|title=Airbus's secret past|url=http://www.economist.com/node/1842124|newspaper=[[The Economist]]|access-date=15 October 2013|date=14 June 2003|archive-url=https://web.archive.org/web/20131021194132/http://www.economist.com/node/1842124|archive-date=21 October 2013|url-status=live}}</ref>
* The United States defense contractor [[Raytheon]] won a US$1.3&nbsp;billion contract with the [[Government of Brazil]] to monitor the [[Amazon rainforest]] after the US [[Central Intelligence Agency]] (CIA), acting as a [[whistleblower]], reported that Raytheon's [[France|French]] competitor [[Thomson-Alcatel]] had been paying bribes to get the contract.<ref>{{cite web |title=Big Surveillance Project For the Amazon Jungle Teeters Over Scandals |url=https://www.csmonitor.com/1996/0125/25071.html/%28page%29/2 |work=[[The Christian Science Monitor]] |access-date=15 October 2013 |archive-url=https://web.archive.org/web/20160303225107/http://www.csmonitor.com/1996/0125/25071.html/(page)/2 |archive-date=3 March 2016 |url-status=live}}</ref>
* The United States defense contractor [[Raytheon]] won a US$1.3 billion contract with the [[Government of Brazil]] to monitor the [[Amazon rainforest]] after the US [[Central Intelligence Agency]] (CIA), acting as a [[whistleblower]], reported that Raytheon's [[France|French]] competitor [[Thomson-Alcatel]] had been paying bribes to get the contract.<ref>{{cite web|title=Big Surveillance Project For the Amazon Jungle Teeters Over Scandals|url=http://www.csmonitor.com/1996/0125/25071.html/%28page%29/2|work=[[The Christian Science Monitor]]|access-date=15 October 2013|archive-url=https://web.archive.org/web/20160303225107/http://www.csmonitor.com/1996/0125/25071.html/(page)/2|archive-date=3 March 2016|url-status=live}}</ref>
* In order to boost the United States position in trade negotiations with the then [[Japan|Japanese]] Trade Minister [[Ryutaro Hashimoto]], in 1995 the [[CIA]] eavesdropped on the conversations between Japanese bureaucrats and executives of car manufacturers [[Toyota]] and [[Nissan]].<ref>{{cite news |author1=David E. Sanger |author2=Tim Weiner |title=Emerging Role For the C.I.A.: Economic Spy |url=https://www.nytimes.com/1995/10/15/world/emerging-role-for-the-cia-economic-spy.html |work=[[The New York Times]] |access-date=15 October 2013 |date=15 October 1995 |archive-url=https://web.archive.org/web/20190710032224/https://www.nytimes.com/1995/10/15/world/emerging-role-for-the-cia-economic-spy.html |archive-date=10 July 2019 |url-status=live}}</ref>
* In order to boost the United States position in trade negotiations with the then [[Japan|Japanese]] Trade Minister [[Ryutaro Hashimoto]], in 1995 the [[CIA]] eavesdropped on the conversations between Japanese bureaucrats and executives of car manufacturers [[Toyota]] and [[Nissan]].<ref>{{cite news|author=David E. Sanger and Tim Weiner|title=Emerging Role For the C.I.A.: Economic Spy|url=https://www.nytimes.com/1995/10/15/world/emerging-role-for-the-cia-economic-spy.html|work=[[The New York Times]]|access-date=15 October 2013|date=15 October 1995|archive-url=https://web.archive.org/web/20190710032224/https://www.nytimes.com/1995/10/15/world/emerging-role-for-the-cia-economic-spy.html|archive-date=10 July 2019|url-status=live}}</ref>


== Workings ==
== Workings ==
[[File:Echelon-yakima-diagram.jpg|upright=1.35|thumb|System diagram of the ECHELON satellite intercept station of the NSA at the Yakima Research Station (YRS)<ref name="yrs2011">The Northwest Passage, Yakima Research Station (YRS) newsletter: [http://www.documentcloud.org/documents/2189960-nwp-nsa.html Volume 2, Issue 1, January 2011] {{Webarchive|url=https://web.archive.org/web/20150922172422/http://www.documentcloud.org/documents/2189960-nwp-nsa.html |date=22 September 2015 }}.</ref><br />
[[File:Echelon-yakima-diagram.jpg|upright=1.35|thumb|System diagram of the ECHELON satellite intercept station of the NSA at the Yakima Research Station (YRS)<ref name="yrs2011">The Northwest Passage, Yakima Research Station (YRS) newsletter: [http://www.documentcloud.org/documents/2189960-nwp-nsa.html Volume 2, Issue 1, January 2011]. {{Webarchive|url=https://web.archive.org/web/20150922172422/http://www.documentcloud.org/documents/2189960-nwp-nsa.html |date=22 September 2015 }}.</ref>
TOPCO = Terminal Operations Control<br />
{{unbulleted list
CCS = Computer Control Subsystem<br />
| TOPCO Terminal Operations Control
STEAMS = System Test, Evaluation, Analysis, and Monitoring Subsystem<br />
| CCS Computer Control Subsystem
SPS = Signal Processing Subsystem<br />
| STEAMS System Test, Evaluation, Analysis, and Monitoring Subsystem
TTDM = Teletype Demodulator]]
| SPS Signal Processing Subsystem
The first United States [[satellite]] ground station for the ECHELON collection program was built in 1971 at a military firing and training center near [[Yakima, Washington]]. The facility, which was codenamed JACKKNIFE, was an investment of ca. 21.3 million dollars and had around 90 people. [[Satellite]] traffic was intercepted by a 30-meter single-dish antenna. The station became fully operational on 4 October 1974. It was connected with NSA headquarters at Fort Meade by a 75-baud secure Teletype orderwire channel.<ref name=yrs />
| TTDM Teletype Demodulator
}}]]
The first United States [[satellite]] ground station for the ECHELON collection program was built in 1971 at a military firing and training center near [[Yakima, Washington]]. The facility, which was codenamed JACKKNIFE, was an investment of about 21.3&nbsp;million dollars and had around 90 people. [[Satellite]] traffic was intercepted by a 30-meter single-dish antenna. The station became fully operational on 4&nbsp;October 1974. It was connected with NSA headquarters at Fort Meade by a 75-[[baud]] secure Teletype orderwire channel.<ref name=yrs />


In 1999 the [[Australian Senate]] [[Joint Standing Committee on Treaties]] was told by Professor [[Desmond Ball]] that the [[Pine Gap]] facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in [[geostationary orbit]]s. The original purpose of the network was to monitor the [[telemetry]] from 1970s [[:Category:Cold War weapons of the Soviet Union|Soviet weapons]], air defence and other radars' capabilities, satellites' ground stations' transmissions and ground-based [[Microwave transmission|microwave communications]].<ref>{{cite web |url=http://www.aph.gov.au/hansard/joint/commttee/j2408.pdf |archive-url=https://web.archive.org/web/20110608040058/http://www.aph.gov.au/hansard/joint/commttee/j2408.pdf |archive-date=8 June 2011 |title=Pine Gap |url-status=dead |access-date=19 August 2016}}, Official Committee Hansard, Joint Standing Committee on Treaties, 9 August 1999. Commonwealth of Australia.</ref>
In 1999 the [[Australian Senate]] [[Joint Standing Committee on Treaties]] was told by Professor [[Desmond Ball]] that the [[Pine Gap]] facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100&nbsp;meters in diameter in [[geostationary orbit]]s. The original purpose of the network was to monitor the [[telemetry]] from 1970s [[:Category:Cold War weapons of the Soviet Union|Soviet weapons]], air defence and other radars' capabilities, satellites' ground stations' transmissions and ground-based [[microwave transmission]]s.<ref>{{cite web |url=http://www.aph.gov.au/hansard/joint/commttee/j2408.pdf |archive-url=https://web.archive.org/web/20110608040058/http://www.aph.gov.au/hansard/joint/commttee/j2408.pdf |archive-date=8 June 2011 |title=Pine Gap |url-status=dead |access-date=19 August 2016}}, Official Committee Hansard, Joint Standing Committee on Treaties, 9 August 1999. Commonwealth of Australia.</ref>


=== Examples of industrial espionage ===
=== Examples of industrial espionage ===
In 1999, Enercon, a [[Germany|German]] company and leading manufacturer of wind energy equipment, developed a breakthrough generator for wind turbines. After applying for a US patent, it had learned that Kenetech, an American rival, had submitted an almost identical patent application shortly before. By the statement of a former [[NSA]] employee, it was later claimed that the NSA had secretly intercepted and monitored [[Enercon]]'s data communications and conference calls and passed information regarding the new generator to Kenetech.<ref>{{Cite web|url=https://fas.org/irp/program/process/rapport_echelon_en.pdf|title=Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))|last=Schmid|first=Gerhard|date=2001-07-11|access-date=2018-08-06|archive-url=https://web.archive.org/web/20190628043116/https://fas.org/irp/program/process/rapport_echelon_en.pdf|archive-date=28 June 2019|url-status=live}}</ref> However, later German media reports contradicted this story, as it was revealed that the American patent in question was actually filed three years before the alleged wiretapping was said to have taken place.<ref>{{cite news |last1=Sattar |first1=Majid |title=NSA-Affäre: Ja, meine Freunde, wir spionieren euch aus! |url=https://www.faz.net/aktuell/politik/ausland/amerika/nsa-affaere-ja-meine-freunde-wir-spionieren-euch-aus-12267465-p2.html |website=FAZ.NET |date=July 2013 |language=de |access-date=21 November 2022 |archive-date=21 November 2022 |archive-url=https://web.archive.org/web/20221121023532/https://www.faz.net/aktuell/politik/ausland/amerika/nsa-affaere-ja-meine-freunde-wir-spionieren-euch-aus-12267465-p2.html |url-status=live }}</ref> As German intelligence services are forbidden from engaging in industrial or economic espionage, German companies have complained that this leaves them defenceless against industrial espionage from the United States or Russia. According to Wolfgang Hoffmann, a former manager at [[Bayer]], German intelligence services know which companies are being targeted by US intelligence agencies, but refuse to inform the companies involved.<ref>{{Cite news|url=https://www.irishtimes.com/business/electronic-spies-torture-german-firms-1.174447|title=Electronic spies torture German firms|last=Staunton|first=Denis|date=1999-04-16|newspaper=The Irish Times|access-date=2018-08-06|language=en|archive-url=https://web.archive.org/web/20180921162157/https://www.irishtimes.com/business/electronic-spies-torture-german-firms-1.174447|archive-date=21 September 2018|url-status=live}}</ref>
In 1999, Enercon, a [[Germany|German]] company and leading manufacturer of wind-energy equipment, developed a breakthrough generator for wind turbines. After applying for a US patent, it had learned that Kenetech, an American rival, had submitted an almost identical patent application shortly before. By the statement of a former [[NSA]] employee, it was later claimed that the NSA had secretly intercepted and monitored [[Enercon]]'s data communications and conference calls and passed information regarding the new generator to Kenetech.<ref>{{Cite web |url=https://fas.org/irp/program/process/rapport_echelon_en.pdf |title=Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)) |last=Schmid |first=Gerhard |date=2001-07-11 |access-date=2018-08-06 |archive-url=https://web.archive.org/web/20190628043116/https://fas.org/irp/program/process/rapport_echelon_en.pdf |archive-date=28 June 2019 |url-status=live}}</ref> However, later German media reports contradicted this story, as it was revealed that the American patent in question was actually filed three years before the alleged wiretapping was said to have taken place.<ref>{{cite news |last1=Sattar |first1=Majid |title=NSA-Affäre: Ja, meine Freunde, wir spionieren euch aus! |url=https://www.faz.net/aktuell/politik/ausland/amerika/nsa-affaere-ja-meine-freunde-wir-spionieren-euch-aus-12267465-p2.html |website=FAZ.NET |date=July 2013 |language=de |access-date=21 November 2022 |archive-date=21 November 2022 |archive-url=https://web.archive.org/web/20221121023532/https://www.faz.net/aktuell/politik/ausland/amerika/nsa-affaere-ja-meine-freunde-wir-spionieren-euch-aus-12267465-p2.html |url-status=live }}</ref> As German intelligence services are forbidden from engaging in industrial or economic espionage, German companies have complained that this leaves them defenceless against industrial espionage from the United States or Russia. According to Wolfgang Hoffmann, a former manager at [[Bayer]], German intelligence services know which companies are being targeted by US intelligence agencies, but refuse to inform the companies involved.<ref>{{Cite news |url=https://www.irishtimes.com/business/electronic-spies-torture-german-firms-1.174447 |title=Electronic spies torture German firms |last=Staunton |first=Denis |date=1999-04-16 |newspaper=The Irish Times |access-date=2018-08-06 |language=en |archive-url=https://web.archive.org/web/20180921162157/https://www.irishtimes.com/business/electronic-spies-torture-german-firms-1.174447 |archive-date=21 September 2018 |url-status=live}}</ref>


== See also ==
== See also ==

Latest revision as of 08:42, 16 September 2025

Script error: No such module "other uses". Template:Short description Template:Global surveillance

Template:Use dmy dates

File:Menwith-hill-radome.jpg
A radome at RAF Menwith Hill, a site with satellite uplink capabilities believed to be used by ECHELON
File:Menwith-hill-radomes.jpg
RAF Menwith Hill, North Yorkshire, England
File:Security Hill at Misawa Air Base with AN-FLR-9 (1990s).png
Misawa Air Base Security Operations Center (MSOC), Aomori Prefecture, Japan

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:[1] Australia, Canada, New Zealand, the UK and the United States, also known as the Five Eyes.[2][3][4]

Created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.[5][6] By the end of the 20th century, it had greatly expanded.[7]

Organization

File:UKUSA Map.svg
Map of the UKUSA Agreement countries: Australia, Canada, New Zealand, United Kingdom, and the United States

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

List of intercept stations according to Edward Snowden's documents
Operated by the United States
Country Location Operator(s) Codename
Template:Country data Brazil Brasília, Federal District SCS
Template:Country data Germany Bad Aibling, Bavaria GARLICK[10]
Template:Country data India New Delhi SCS
Template:Country data Japan Misawa, Tōhoku region LADYLOVE[13]
Template:Country data Thailand Khon Kaen, Isan

16°28'31.6"N 102°50'39.2"E

INDRA /

LEMONWOOD[14]

Template:Country data United Kingdom Menwith Hill, Harrogate MOONPENNY[14]
Template:Country data United States Sugar Grove, West Virginia TIMBERLINE[17]
Yakima, Washington JACKKNIFE[14]
Sábana Seca, Puerto Rico CORALINE[14]
Operated Jointly with the United States (2nd party)
Country Location Contributor(s) Codename
Template:Country data Australia Geraldton, WA STELLAR[12]
Darwin, NT SHOAL BAY[12]
Template:Country data New Zealand Waihopai Station IRONSAND[12]
Template:Country data United Kingdom Bude, Cornwall CARBOY[17]
Template:Country data Cyprus Ayios Nikolaos Station SOUNDER[20]
Template:Country data Kenya Nairobi SCAPEL[14]
Template:Country data Oman Seeb, Muscat SNICK[14]

Reporting and disclosures

Public disclosures (1972–2000)

Former NSA analyst Perry Fellwock, under the pseudonym Winslow Peck, first blew the whistle on ECHELON to Ramparts in 1972,[21] when he revealed the existence of a global network of listening posts and told of his experiences working there. He also revealed the existence of nuclear weapons in Israel in 1972, the widespread involvement of CIA and NSA personnel in drugs and human smuggling, and CIA operatives leading Nationalist Chinese (Taiwan) commandos in burning villages inside PRC borders.[22]

In 1982, investigative journalist and author James Bamford wrote The Puzzle Palace, an in-depth history of the NSA and its practices, which notably leaked the existence of the eavesdropping operation Project SHAMROCK. Project SHAMROCK ran from 1945 to 1975, after which it evolved into ECHELON.[23][24]

In 1988, Margaret Newsham, a Lockheed employee under NSA contract, disclosed the ECHELON surveillance system to members of Congress. Newsham told a member of the US Congress that the telephone calls of Strom Thurmond, a Republican US senator, were being collected by the NSA. Congressional investigators determined that "targeting of US political figures would not occur by accident, but was designed into the system from the start".[25]

Also in 1988, an article titled "Somebody's Listening", written by investigative journalist Duncan Campbell in the New Statesman, described the signals intelligence gathering activities of a program code-named "ECHELON".[25] Bamford described the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.[26]

A detailed description of ECHELON was provided by the New Zealand journalist Nicky Hager in his 1996 book Secret Power: New Zealand's Role in the International Spy Network.[27] Two years later, Hager's book was cited by the European Parliament in a report titled "An Appraisal of the Technology of Political Control" (PE 168.184).[28]

In March 1999, for the first time in history, the Australian government admitted that news reports about the top-secret UKUSA Agreement were true.[29] Martin Brady, the director of Australia's Defence Signals Directorate (DSD, now known as Australian Signals Directorate, or ASD) told the Australian broadcasting channel Nine Network that the DSD "does co-operate with counterpart signals intelligence organisations overseas under the UKUSA relationship".[30]

In 2000, James Woolsey, the former Director of the US Central Intelligence Agency, confirmed that US intelligence uses interception systems and keyword searches to monitor European businesses.[31]

Lawmakers in the United States feared that the ECHELON system could be used to monitor US citizens.[32] According to The New York Times, the ECHELON system has been "shrouded in such secrecy that its very existence has been difficult to prove".[32] Critics said that the ECHELON system emerged from the Cold War as a "Big Brother without a cause".[33]

European Parliament investigation (2000–2001)

File:Nicky Hager at European Parliament April 2001b.jpg
The New Zealand journalist Nicky Hager, who testified before the European Parliament and provided specific details about the ECHELON surveillance system[34]

The program's capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001.[7] In July 2000, the Temporary Committee on the ECHELON Interception System was established by the European parliament to investigate the surveillance network.[35] It was chaired by the Portuguese politician Carlos Coelho, who was in charge of supervising investigations throughout 2000 and 2001.

In May 2001, as the committee finalised its report on the ECHELON system, a delegation travelled to Washington, D.C. to attend meetings with US officials from the following agencies and departments:

All meetings were cancelled by the US government, and the committee was forced to end its trip prematurely.[36] According to a BBC correspondent in May 2001, "The US Government still refuses to admit that Echelon even exists."[5]

In July 2001, the Committee released its final report.[37] The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[7] On 5 September 2001, the European parliament voted to accept the report.[38]

The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system.[7] The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers, including satellite transmission, public switched telephone networks (which once carried most Internet traffic), and microwave links.[7]

Confirmation of ECHELON (2015)

Two internal NSA newsletters from January 2011 and July 2012, published as part of Edward Snowden's leaks by the website The Intercept on 3 August 2015, for the first time confirmed that NSA used the code word ECHELON and provided some details about the scope of the program: ECHELON was part of an umbrella program with the code name FROSTING, which was established by the NSA in 1966 to collect and process data from communications satellites. FROSTING had two sub-programs:[39]

  • TRANSIENT: for intercepting Soviet satellite transmissions
  • ECHELON: for intercepting Intelsat satellite transmissions

The European Parliament's Temporary Committee on the ECHELON Interception System stated, "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail".[7] The US intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham said that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, from 1974 to 1984 in Sunnyvale, California, in the United States, and in Menwith Hill, England, in the UK.[40] At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[41][42]

Britain's The Guardian newspaper summarized the capabilities of the ECHELON system as follows:

<templatestyles src="Template:Blockquote/styles.css" />

A global network of electronic spy stations that can eavesdrop on telephones, faxes and computers. It can even track bank accounts. This information is stored in Echelon computers, which can keep millions of records on individuals. Officially, however, Echelon doesn't exist.[43]

Script error: No such module "Check for unknown parameters".

Documents leaked by the former NSA contractor Edward Snowden revealed that the ECHELON system's collection of satellite data is also referred to as FORNSAT - an abbreviation for "Foreign Satellite Collection".[44][45]

Intercept stations

First revealed by the European Parliament report (p. 54 ff)[7] and confirmed later by the Edward Snowden disclosures the following ground stations presently have, or have had, a role in intercepting transmissions from Satellite and other means of communication:[7]

History and context

File:Echelon-yakima-02.jpg
Equipment at the Yakima Research Station (YRS) in the early days of the ECHELON program

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[7] During World War II and through the 1950s, high-frequency ("short-wave") radio was widely used for military and diplomatic communication[57] and could be intercepted at great distances.[7] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications.[58] In 1964, plans for the establishment of the ECHELON network took off after dozens of countries agreed to establish the International Telecommunications Satellite Organization (Intelsat), which would own and operate a global constellation of communications satellites.[29]

File:Echelon-yakima-01.jpg
Teletype operators at the Yakima Research Station (YRS) in the early days of the ECHELON program

In 1966, the first Intelsat satellite was launched into orbit. From 1970 to 1971, the Government Communications Headquarters (GCHQ) of Britain began to operate a secret signal station at Morwenstow, near Bude in Cornwall, England. The station intercepted satellite communications over the Atlantic and Indian Oceans. Soon afterwards, the US National Security Agency (NSA) built a second signal station at Yakima, near Seattle, for the interception of satellite communications over the Pacific Ocean.[29] In 1981, GCHQ and the NSA started the construction of the first global wide area network (WAN). Soon after Australia, Canada, and New Zealand joined the ECHELON system.[29] The report to the European Parliament of 2001 states: "If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax, and data traffic transmitted via such satellites."[7]

Most reports on ECHELON focus on satellite interception. Testimony before the European Parliament indicated that separate but similar UKUSA systems are in place to monitor communication through undersea cables, microwave transmissions, and other lines.[59] The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the US or British foreign intelligence services.[7] The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics. In 2006, 99% of the world's long-distance voice and data traffic was carried over optical-fiber.[60] The proportion of international communications accounted for by satellite links is said to have decreased substantially to an amount between 0.4% and 5% in Central Europe.[7] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[61] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[7]

Concerns

British journalist Duncan Campbell and New Zealand journalist Nicky Hager said in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[59] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[7][62] and the speech technology developed by the Belgian firm Lernout & Hauspie.[63]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[7]

American author James Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.[64]

In its report, the committee of the European Parliament stated categorically that the Echelon network was being used to intercept not only military communications, but also private and business ones. In its epigraph to the report, the parliamentary committee quoted Juvenal, "Script error: No such module "Lang"." ("But who will watch the watchers").[7] James Bamford, in The Guardian in May 2001, warned that if Echelon were to continue unchecked, it could become a "cyber secret police, without courts, juries, or the right to a defence".[65]

Alleged examples of espionage conducted by the members of the "Five Eyes" include:

Workings

File:Echelon-yakima-diagram.jpg
System diagram of the ECHELON satellite intercept station of the NSA at the Yakima Research Station (YRS)[76] Template:Unbulleted list

The first United States satellite ground station for the ECHELON collection program was built in 1971 at a military firing and training center near Yakima, Washington. The facility, which was codenamed JACKKNIFE, was an investment of about 21.3 million dollars and had around 90 people. Satellite traffic was intercepted by a 30-meter single-dish antenna. The station became fully operational on 4 October 1974. It was connected with NSA headquarters at Fort Meade by a 75-baud secure Teletype orderwire channel.[39]

In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence and other radars' capabilities, satellites' ground stations' transmissions and ground-based microwave transmissions.[77]

Examples of industrial espionage

In 1999, Enercon, a German company and leading manufacturer of wind-energy equipment, developed a breakthrough generator for wind turbines. After applying for a US patent, it had learned that Kenetech, an American rival, had submitted an almost identical patent application shortly before. By the statement of a former NSA employee, it was later claimed that the NSA had secretly intercepted and monitored Enercon's data communications and conference calls and passed information regarding the new generator to Kenetech.[78] However, later German media reports contradicted this story, as it was revealed that the American patent in question was actually filed three years before the alleged wiretapping was said to have taken place.[79] As German intelligence services are forbidden from engaging in industrial or economic espionage, German companies have complained that this leaves them defenceless against industrial espionage from the United States or Russia. According to Wolfgang Hoffmann, a former manager at Bayer, German intelligence services know which companies are being targeted by US intelligence agencies, but refuse to inform the companies involved.[80]

See also

Bibliography

Notes and references

Template:Reflist

External links

Template:Sister project

  • Script error: No such module "citation/CS1".
  • Script error: No such module "citation/CS1".

Template:Espionage Template:Intelligence cycle management

  1. REDIRECT Template:National intelligence agencies
  1. Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".
    From Talk:UKUSA Agreement: "Per documents officially released by both the Government Communications Headquarters and the National Security Agency, this agreement is referred to as the UKUSA Agreement. This name is subsequently used by media sources reporting on the story, as written in new references used for the article. The NSA press release provides a pronunciation guide, indicating that "UKUSA" should not be read as two separate entities.Script error: No such module "citation/CS1". (National Security Agency) Template:Webarchive"
  2. Script error: No such module "citation/CS1".
  3. Google booksEchelon by John O'Neill
  4. Script error: No such module "citation/CS1".
  5. a b Script error: No such module "citation/CS1".
  6. Script error: No such module "Citation/CS1".
  7. a b c d e f g h i j k l m n o p q r s t Script error: No such module "citation/CS1".
  8. a b c Script error: No such module "citation/CS1".
  9. a b Script error: No such module "citation/CS1".
  10. Script error: No such module "citation/CS1".
  11. a b Script error: No such module "citation/CS1".
  12. a b c d e f g h i j Script error: No such module "citation/CS1".
  13. Script error: No such module "citation/CS1".
  14. a b c d e f Script error: No such module "citation/CS1".
  15. Script error: No such module "citation/CS1".
  16. Script error: No such module "citation/CS1".
  17. a b Script error: No such module "citation/CS1".
  18. Script error: No such module "citation/CS1".
  19. a b c d Script error: No such module "citation/CS1".
  20. Script error: No such module "citation/CS1".
  21. Script error: No such module "Citation/CS1".
  22. Script error: No such module "citation/CS1".
  23. Script error: No such module "citation/CS1".
  24. Script error: No such module "citation/CS1".
  25. a b Script error: No such module "citation/CS1".
  26. Script error: No such module "citation/CS1".
  27. Script error: No such module "citation/CS1".
  28. Script error: No such module "citation/CS1".
  29. a b c d Script error: No such module "citation/CS1".
  30. Script error: No such module "citation/CS1".
  31. Script error: No such module "citation/CS1".
  32. a b Script error: No such module "citation/CS1".
  33. Script error: No such module "citation/CS1".
  34. Script error: No such module "citation/CS1".
  35. Script error: No such module "Citation/CS1".
  36. a b c d Script error: No such module "citation/CS1".
  37. Script error: No such module "citation/CS1".
  38. Script error: No such module "citation/CS1".
  39. a b The Northwest Passage, Yakima Research Station (YRS) newsletter: Volume 2, Issue 1, January 2011 Template:Webarchive & Volume 3, Issue 7, July 2012 Template:Webarchive.
  40. Script error: No such module "citation/CS1". "Unfortunately, I can't tell you all my duties. I am still bound by professional secrecy, and I would hate to go to prison or get involved in any trouble, if you know what I mean. In general, I can tell you that I was responsible for compiling the various systems and programs, configuring the whole thing and making it operational on mainframes"; "Margaret Newsham worked for the NSA through her employment at Ford and Lockheed from 1974 to 1984. In 1977 and 1978 Newsham was stationed at the largest listening post in the world at Menwith Hill, England ... Ekstra Bladet has Margaret Newsham's stationing orders from the US Department of Defense. She possessed the high security classification TOP SECRET CRYPTO."
  41. Script error: No such module "citation/CS1".
  42. Script error: No such module "citation/CS1".
  43. Script error: No such module "citation/CS1".
  44. Script error: No such module "citation/CS1".
  45. Script error: No such module "citation/CS1".
  46. Le Monde Diplomatique Template:Webarchive, September 2010
  47. Script error: No such module "citation/CS1".
  48. Script error: No such module "citation/CS1".
  49. a b Script error: No such module "citation/CS1".
  50. Script error: No such module "citation/CS1".
  51. Script error: No such module "citation/CS1".
  52. Script error: No such module "citation/CS1".
  53. Script error: No such module "citation/CS1".
  54. According to a statement by Terence Dudlee, the speaker of the US Navy in London, in an interview to the German HR (Hessischer Rundfunk)
    Script error: No such module "citation/CS1". (German), hr online, 1 October 2004
  55. Script error: No such module "citation/CS1".
  56. Script error: No such module "citation/CS1".
  57. The Codebreakers, Ch. 10, 11
  58. Script error: No such module "citation/CS1".
  59. a b For example: Script error: No such module "citation/CS1".
  60. Script error: No such module "citation/CS1".
  61. Script error: No such module "citation/CS1".
  62. Die Zeit: 40/1999 "Verrat unter FreundenTemplate:-" ("Treachery among friends", German), available at Script error: No such module "citation/CS1".
  63. Script error: No such module "citation/CS1". (Google's translation of the article into English Template:Webarchive).
  64. Script error: No such module "citation/CS1".
  65. Bustillos, Maria (9 June 2013). "Our reflection in the N.S.A.'s PRISM". Template:Webarchive. The New Yorker. Retrieved: 2013-10-12.
  66. Script error: No such module "citation/CS1".
  67. a b Script error: No such module "citation/CS1".
  68. Script error: No such module "citation/CS1".
  69. Script error: No such module "citation/CS1".
  70. Script error: No such module "citation/CS1".
  71. Script error: No such module "citation/CS1".
  72. Script error: No such module "citation/CS1".
  73. Script error: No such module "citation/CS1".
  74. Script error: No such module "citation/CS1".
  75. Script error: No such module "citation/CS1".
  76. The Northwest Passage, Yakima Research Station (YRS) newsletter: Volume 2, Issue 1, January 2011. Template:Webarchive.
  77. Script error: No such module "citation/CS1"., Official Committee Hansard, Joint Standing Committee on Treaties, 9 August 1999. Commonwealth of Australia.
  78. Script error: No such module "citation/CS1".
  79. Script error: No such module "citation/CS1".
  80. Script error: No such module "citation/CS1".