Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

ECHELON

From Wikipedia, the free encyclopedia
For other uses, seeEchelon.
Signals intelligence collection and analysis network
Part ofa series on
Global surveillance
Disclosures
Systems
Selected agencies
Places
Laws
Proposed changes
Concepts
Related topics

Aradome atRAF Menwith Hill, a site withsatelliteuplink capabilities believed to be used by ECHELON
RAF Menwith Hill,North Yorkshire, England
Misawa Air Base Security Operations Center (MSOC),Aomori Prefecture, Japan

ECHELON, originally a secret governmentcode name, is asurveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to theUKUSA Security Agreement:[1] Australia, Canada, New Zealand, the UK and the United States, also known as theFive Eyes.[2][3][4]

Created in the late 1960s to monitor themilitary anddiplomatic communications of theSoviet Union and itsEastern Bloc allies during theCold War, the ECHELON project became formally established in 1971.[5][6] By the end of the 20th century, it had greatly expanded.[7]

Organization

[edit]
Map of theUKUSA Agreement countries: Australia, Canada, New Zealand, United Kingdom, and the United States

TheUKUSA intelligence community was assessed by theEuropean Parliament (EP) in 2000 to include thesignals intelligence agencies of each of the member states:

List of intercept stations according toEdward Snowden's documents
Operated by the United States
CountryLocationOperator(s)Codename
BrazilBrasília,Federal DistrictSCS
GermanyBad Aibling, BavariaGARLICK[10]
IndiaNew DelhiSCS
JapanMisawa, Tōhoku regionLADYLOVE[13]
ThailandKhon Kaen, Isan

16°28'31.6"N 102°50'39.2"E

INDRA /

LEMONWOOD[14]

United KingdomMenwith Hill, HarrogateMOONPENNY[14]
United StatesSugar Grove, West VirginiaTIMBERLINE[17]
Yakima, WashingtonJACKKNIFE[14]
Sábana Seca, Puerto RicoCORALINE[14]
Operated Jointly with the United States (2nd party)
CountryLocationContributor(s)Codename
AustraliaGeraldton, WASTELLAR[12]
Darwin, NTSHOAL BAY[12]
New ZealandWaihopai StationIRONSAND[12]
United KingdomBude, CornwallCARBOY[17]
CyprusAyios Nikolaos StationSOUNDER[20]
KenyaNairobiSCAPEL[14]
OmanSeeb,MuscatSNICK[14]

Reporting and disclosures

[edit]

Public disclosures (1972–2000)

[edit]

Former NSA analystPerry Fellwock, under the pseudonym Winslow Peck, first blew the whistle on ECHELON toRamparts in 1972,[21] when he revealed the existence of a global network of listening posts and told of his experiences working there. He also revealed the existence ofnuclear weapons in Israel in 1972, the widespread involvement ofCIA and NSA personnel in drugs and human smuggling, and CIA operatives leading Nationalist Chinese (Taiwan) commandos in burning villages insidePRC borders.[22]

In 1982, investigative journalist and authorJames Bamford wroteThe Puzzle Palace, an in-depth history of the NSA and its practices, which notably leaked the existence of the eavesdropping operationProject SHAMROCK. Project SHAMROCK ran from 1945 to 1975, after which it evolved into ECHELON.[23][24]

In 1988, Margaret Newsham, aLockheed employee under NSA contract, disclosed the ECHELONsurveillance system to members of Congress. Newsham told a member of theUS Congress that the telephone calls ofStrom Thurmond, aRepublican US senator, were being collected by the NSA. Congressional investigators determined that "targeting of US political figures would not occur by accident, but was designed into the system from the start".[25]

Also in 1988, an article titled "Somebody's Listening", written by investigative journalistDuncan Campbell in theNew Statesman, described thesignals intelligence gathering activities of a program code-named "ECHELON".[25] Bamford described the system as the software controlling the collection and distribution of civiliantelecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.[26]

A detailed description of ECHELON was provided by the New Zealand journalistNicky Hager in his 1996 bookSecret Power: New Zealand's Role in the International Spy Network.[27] Two years later, Hager's book was cited by theEuropean Parliament in a report titled "An Appraisal of the Technology of Political Control" (PE 168.184).[28]

In March 1999, for the first time in history, theAustralian government admitted that news reports about the top-secretUKUSA Agreement were true.[29] Martin Brady, the director of Australia'sDefence Signals Directorate (DSD, now known as Australian Signals Directorate, or ASD) told the Australian broadcasting channelNine Network that the DSD "does co-operate with counterpartsignals intelligence organisations overseas under theUKUSA relationship".[30]

In 2000,James Woolsey, the former Director of the USCentral Intelligence Agency, confirmed that US intelligence uses interception systems and keyword searches to monitorEuropean businesses.[31]

Lawmakers in the United States feared that the ECHELON system could be used to monitor US citizens.[32] According toThe New York Times, the ECHELON system has been "shrouded in such secrecy that its very existence has been difficult to prove".[32] Critics said that the ECHELON system emerged from theCold War as a "Big Brother without a cause".[33]

European Parliament investigation (2000–2001)

[edit]
The New Zealand journalistNicky Hager, who testified before theEuropean Parliament and provided specific details about the ECHELONsurveillance system[34]

The program's capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001.[7] In July 2000, the Temporary Committee on the ECHELON Interception System was established by the European parliament to investigate thesurveillance network.[35] It was chaired by the Portuguese politicianCarlos Coelho, who was in charge of supervising investigations throughout 2000 and 2001.

In May 2001, as the committee finalised its report on the ECHELON system, a delegation travelled toWashington, D.C. to attend meetings with US officials from the following agencies and departments:

All meetings were cancelled by the US government, and the committee was forced to end its trip prematurely.[36] According to aBBC correspondent in May 2001, "The US Government still refuses to admit that Echelon even exists."[5]

In July 2001, the Committee released its final report.[37] The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[7] On 5 September 2001, the European parliament voted to accept the report.[38]

The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system.[7] The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers, including satellite transmission,public switched telephone networks (which once carried most Internet traffic), andmicrowave links.[7]

Confirmation of ECHELON (2015)

[edit]

Two internal NSA newsletters from January 2011 and July 2012, published as part ofEdward Snowden's leaks by the websiteThe Intercept on 3 August 2015, for the first time confirmed that NSA used the code word ECHELON and provided some details about the scope of the program: ECHELON was part of an umbrella program with the code name FROSTING, which was established by the NSA in 1966 to collect and process data fromcommunications satellites. FROSTING had two sub-programs:[39]

  • TRANSIENT: for interceptingSoviet satellite transmissions
  • ECHELON: for interceptingIntelsat satellite transmissions

TheEuropean Parliament'sTemporary Committee on the ECHELON Interception System stated, "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail".[7] The US intelligence community uses many code names (see, for example,CIA cryptonym).

Former NSA employeeMargaret Newsham said that she worked on the configuration and installation of software that makes up the ECHELON system while employed atLockheed Martin, from 1974 to 1984 inSunnyvale, California, in theUnited States, and inMenwith Hill,England, in theUK.[40] At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called itP415. The software programs were calledSILKWORTH andSIRE. Asatellite namedVORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[41][42]

Britain'sThe Guardian newspaper summarized the capabilities of the ECHELON system as follows:

A global network of electronic spy stations that can eavesdrop on telephones, faxes and computers. It can even track bank accounts. This information is stored in Echelon computers, which can keep millions of records on individuals.Officially, however, Echelon doesn't exist.[43]

Documents leaked by the former NSA contractorEdward Snowden revealed that the ECHELON system's collection of satellite data is also referred to as FORNSAT - an abbreviation for "Foreign Satellite Collection".[44][45]

Intercept stations

[edit]

First revealed by theEuropean Parliament report (p. 54 ff)[7] and confirmed later by theEdward Snowden disclosures the following ground stations presently have, or have had, a role in intercepting transmissions from Satellite and other means of communication:[7]

History and context

[edit]
Equipment at the Yakima Research Station (YRS) in the early days of the ECHELON program

The ability to intercept communications depends on the medium used, be itradio,satellite,microwave,cellular orfiber-optic.[7] DuringWorld War II and through the 1950s,high-frequency ("short-wave") radio was widely used for military and diplomatic communication[57] and could be intercepted at great distances.[7] The rise ofgeostationarycommunications satellites in the 1960s presented new possibilities for intercepting international communications.[58] In 1964, plans for the establishment of the ECHELONnetwork took off after dozens of countries agreed to establish theInternational Telecommunications Satellite Organization (Intelsat), which would own and operate a global constellation ofcommunications satellites.[29]

Teletype operators at the Yakima Research Station (YRS) in the early days of the ECHELON program

In 1966, the firstIntelsatsatellite was launched into orbit. From 1970 to 1971, theGovernment Communications Headquarters (GCHQ) ofBritain began to operate a secret signal station atMorwenstow, nearBude inCornwall, England. The station interceptedsatellite communications over theAtlantic andIndian Oceans. Soon afterwards, the USNational Security Agency (NSA) built a second signal station atYakima, nearSeattle, for the interception of satellite communications over thePacific Ocean.[29] In 1981,GCHQ and the NSA started the construction of the first globalwide area network (WAN). Soon after Australia, Canada, and New Zealand joined the ECHELON system.[29] The report to the European Parliament of 2001 states: "IfUKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax, and data traffic transmitted via such satellites."[7]

Most reports on ECHELON focus on satellite interception. Testimony before theEuropean Parliament indicated that separate but similar UKUSA systems are in place to monitor communication through undersea cables, microwave transmissions, and other lines.[59] The report to theEuropean Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the US or British foreign intelligence services.[7] The role of satellites in point-to-point voice and data communications has largely been supplanted byfiber optics. In 2006, 99% of the world's long-distance voice and data traffic was carried overoptical-fiber.[60] The proportion of international communications accounted for by satellite links is said to have decreased substantially to an amount between 0.4% and 5% in Central Europe.[7] Even in less-developed parts of the world,communications satellites are used largely for point-to-multipoint applications, such as video.[61] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[7]

Concerns

[edit]

British journalistDuncan Campbell andNew Zealand journalist Nicky Hager said in the 1990s that the United States was exploiting ECHELON traffic forindustrial espionage, rather than military and diplomatic purposes.[59] Examples alleged by the journalists include the gear-less wind turbine technology designed by theGerman firmEnercon[7][62] and the speech technology developed by theBelgian firmLernout & Hauspie.[63]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to theEuropean Parliament that citizens of member states routinely usecryptography in their communications to protect their privacy, becauseeconomic espionage with ECHELON has been conducted by the US intelligence agencies.[7]

American authorJames Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.[64]

In its report, the committee of the European Parliament stated categorically that the Echelon network was being used to intercept not only military communications, but also private and business ones. In its epigraph to the report, the parliamentary committee quotedJuvenal, "Sed quis custodiet ipsos custodes" ("But who will watch the watchers").[7] James Bamford, inThe Guardian in May 2001, warned that if Echelon were to continue unchecked, it could become a "cyber secret police, without courts, juries, or the right to a defence".[65]

Alleged examples of espionage conducted by the members of the "Five Eyes" include:

Workings

[edit]
System diagram of the ECHELON satellite intercept station of the NSA at the Yakima Research Station (YRS)[76]
  • TOPCO – Terminal Operations Control
  • CCS – Computer Control Subsystem
  • STEAMS – System Test, Evaluation, Analysis, and Monitoring Subsystem
  • SPS – Signal Processing Subsystem
  • TTDM – Teletype Demodulator

The first United Statessatellite ground station for the ECHELON collection program was built in 1971 at a military firing and training center nearYakima, Washington. The facility, which was codenamed JACKKNIFE, was an investment of about 21.3 million dollars and had around 90 people.Satellite traffic was intercepted by a 30-meter single-dish antenna. The station became fully operational on 4 October 1974. It was connected with NSA headquarters at Fort Meade by a 75-baud secure Teletype orderwire channel.[39]

In 1999 theAustralian SenateJoint Standing Committee on Treaties was told by ProfessorDesmond Ball that thePine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter ingeostationary orbits. The original purpose of the network was to monitor thetelemetry from 1970sSoviet weapons, air defence and other radars' capabilities, satellites' ground stations' transmissions and ground-basedmicrowave transmissions.[77]

Examples of industrial espionage

[edit]

In 1999, Enercon, aGerman company and leading manufacturer of wind-energy equipment, developed a breakthrough generator for wind turbines. After applying for a US patent, it had learned that Kenetech, an American rival, had submitted an almost identical patent application shortly before. By the statement of a formerNSA employee, it was later claimed that the NSA had secretly intercepted and monitoredEnercon's data communications and conference calls and passed information regarding the new generator to Kenetech.[78] However, later German media reports contradicted this story, as it was revealed that the American patent in question was actually filed three years before the alleged wiretapping was said to have taken place.[79] As German intelligence services are forbidden from engaging in industrial or economic espionage, German companies have complained that this leaves them defenceless against industrial espionage from the United States or Russia. According to Wolfgang Hoffmann, a former manager atBayer, German intelligence services know which companies are being targeted by US intelligence agencies, but refuse to inform the companies involved.[80]

See also

[edit]

Bibliography

[edit]

Notes and references

[edit]
  1. ^Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".
    FromTalk:UKUSA Agreement: "Per documents officially released by both theGovernment Communications Headquarters and theNational Security Agency, this agreement is referred to as the UKUSA Agreement. This name is subsequently used by media sources reporting on the story, as written in new references used for the article. The NSA press release provides a pronunciation guide, indicating that "UKUSA" should not be read as two separate entities."(The National Archives)". Archived from the original on 2 May 2013. Retrieved10 October 2012.{{cite web}}: CS1 maint: bot: original URL status unknown (link)(National Security Agency)Archived 16 July 2013 at theWayback Machine"
  2. ^"UK 'biggest spy' among the Five Eyes".News Corp Australia. 22 June 2013.Archived from the original on 23 October 2013. Retrieved19 October 2013.
  3. ^Google booksEchelon by John O'Neill
  4. ^"AUSCANNZUKUS Information Portal". auscannzukus.net. Archived fromthe original on 20 February 2012. Retrieved1 February 2010.
  5. ^ab"Q&A: What you need to know about Echelon". BBC. 29 May 2001.Archived from the original on 18 December 2013. Retrieved17 December 2013.
  6. ^Nabbali, Talitha; Perry, Mark (March 2004). "Going for the throat".Computer Law & Security Review.20 (2):84–97.doi:10.1016/S0267-3649(04)00018-4.It wasn't until 1971 that the UKUSA allies began ECHELON
  7. ^abcdefghijklmnopqrstSchmid, Gerhard (11 July 2001)."On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI))". European Parliament: Temporary Committee on the ECHELON Interception System.Archived from the original on 26 December 2013. Retrieved5 January 2013.
  8. ^abcKaz, Roberto; Casado, José (9 July 2013)."Capitais de 4 países também abrigaram escritório da NSA e CIA".O Globo (in Portuguese).Archived from the original on 6 December 2013. Retrieved31 January 2014.
  9. ^abGude, Hubert; Poitras, Laura; Rosenbach, Marcel (5 August 2013)."German Intelligence Sends Massive Amounts of Data to the NSA".Der Spiegel.Archived from the original on 25 January 2014. Retrieved31 January 2014.
  10. ^Poitras, Laura; Rosenbach, Marcel; Schmid, Fidelius; Stark, Holger; Stock, Jonathan (July 2013)."Cover Story: How the NSA Targets Germany and Europe".Der Spiegel.Archived from the original on 8 December 2013. Retrieved31 January 2014.
  11. ^ab"US spy centre in India too".Deccan Chronicle. 30 October 2013. Archived fromthe original on 2 February 2014. Retrieved31 January 2014.
  12. ^abcdefghijDorling, Philip."Singapore, South Korea revealed as Five Eyes spying partners".The Sydney Morning Herald.Archived from the original on 31 January 2014. Retrieved30 January 2014.
  13. ^"Document 12. "Activation of Echelon Units" from History of the Air Intelligence Agency, 1 January – 31 December 1994, Volume I (San Antonio, TX: AIA, 1995)".George Washington University.The second extract notes that AIA's participation in a classified activity 'had been limited to LADYLOVE operations at Misawa AB [Air Base], Japan'.
  14. ^abcdef"Eyes Wide Open"(PDF).Privacy International. p. 11. Archived fromthe original(PDF) on 6 January 2014. Retrieved31 January 2014.
  15. ^Norton-Taylor, Richard (1 March 2012)."Menwith Hill eavesdropping base undergoes massive expansion".The Guardian.Archived from the original on 26 January 2014. Retrieved31 January 2014.
  16. ^Steelhammer, Rick (4 January 2014)."In W.Va., mountains of NSA secrecy".The Charleston Gazette.Archived from the original on 2 February 2014. Retrieved31 January 2014.
  17. ^abPoitras, Laura; Rosenbach, Marcel; Stark, Holger (20 December 2013)."Friendly Fire: How GCHQ Monitors Germany, Israel and the EU".Der Spiegel.Archived from the original on 25 January 2014. Retrieved31 January 2014.
  18. ^Troianello, Craig (4 April 2013)."NSA to close Yakima Training Center facility".The Seattle Times. Archived fromthe original on 19 February 2014. Retrieved31 January 2014.
  19. ^abcdHopkins, Nick; Borger, Julian (1 August 2013)."Exclusive: NSA pays £100m in secret funding for GCHQ".The Guardian.Archived from the original on 25 January 2014. Retrieved31 January 2014.
  20. ^Squires, Nick (5 November 2013)."British military base in Cyprus 'used to spy on Middle East'".The Daily Telegraph. London.Archived from the original on 2 April 2016. Retrieved31 January 2014.
  21. ^David Horowitz (August 1972). "U.S. Electronic Espionage: A Memoir".Ramparts.11 (2):35–50.
  22. ^"Ramparts interview". Cryptome archive. 1988.Archived from the original on 3 March 2016. Retrieved21 April 2017.
  23. ^Bamford, James (1982).The Puzzle Palace: A Report on America's Most Secret Agency. Houghton Mifflin.ISBN 978-0-14-006748-4.
  24. ^"Puzzle Palace excepts". Cryptome archive.Archived from the original on 19 April 2017. Retrieved21 April 2017.
  25. ^abCampbell, Duncan (12 August 1988)."Somebody's Listening"(PDF).New Statesman. Archived fromthe original(PDF) on 14 June 2013. Retrieved27 November 2013.
  26. ^Bamford, James (2002).Body of Secrets. Anchor.ISBN 978-0-385-49908-8.
  27. ^Campbell, Duncan (1 June 2001)."Echelon Chronology".Heise Online.Archived from the original on 21 December 2013. Retrieved19 December 2013.
  28. ^Wright, Steve (6 January 1998)."An Appraisal of Technologies of Political Control"(PDF).European Parliament.Archived(PDF) from the original on 18 February 2014. Retrieved28 January 2014.
  29. ^abcdCampbell, Duncan."Echelon: World under watch, an introduction".ZDNet.Archived from the original on 19 December 2013. Retrieved19 December 2013.
  30. ^Campbell, Duncan; Honigsbaum, Mark (23 May 1999)."Britain and US spy on world".The Observer.Archived from the original on 19 December 2013. Retrieved19 December 2013.
  31. ^R. James Woolsey (17 March 2000)."Why We Spy on Our Allies".The Wall Street Journal.Archived from the original on 9 July 2017. Retrieved3 August 2017.
  32. ^abNiall McKay (27 May 1999)."Lawmakers Raise Questions About International Spy Network".The New York Times.Archived from the original on 30 January 2013. Retrieved19 December 2013.
  33. ^Suzanne Daley (24 February 2000)."An Electronic Spy Scare Is Alarming Europe".The New York Times. Retrieved19 December 2013.
  34. ^McCarthy, Kieren (14 September 2001)."This is how we know Echelon exists".The Register.Archived from the original on 9 December 2013. Retrieved19 December 2013.
  35. ^Rudner, Martin. "Britain betwixt and between: UK SIGINT alliance strategy's transatlantic and European connections".Intelligence & National Security.
  36. ^abcdRoxburgh, Angus (11 May 2001)."EU investigators 'snubbed' in US".BBC.Archived from the original on 3 February 2014. Retrieved28 January 2014.
  37. ^"Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))".European Parliament. 11 July 2001.Archived from the original on 21 September 2013. Retrieved10 September 2013.
  38. ^"Report: Echelon exists, should be guarded against".USA Today.Associated Press. 5 September 2001.Archived from the original on 21 February 2014. Retrieved7 February 2014.
  39. ^abThe Northwest Passage, Yakima Research Station (YRS) newsletter:Volume 2, Issue 1, January 2011Archived 22 September 2015 at theWayback Machine &Volume 3, Issue 7, July 2012Archived 22 September 2015 at theWayback Machine.
  40. ^Elkjær, Bo; Seeberg, Kenan (17 November 1999)."ECHELON Was My Baby".Ekstra Bladet. Archived fromthe original on 15 June 2006. Retrieved17 May 2006. "Unfortunately, I can't tell you all my duties. I am still bound by professional secrecy, and I would hate to go to prison or get involved in any trouble, if you know what I mean. In general, I can tell you that I was responsible for compiling the various systems and programs, configuring the whole thing and making it operational on mainframes"; "Margaret Newsham worked for theNSA through her employment at Ford and Lockheed from 1974 to 1984. In 1977 and 1978 Newsham was stationed at the largest listening post in the world atMenwith Hill,England ... Ekstra Bladet has Margaret Newsham's stationing orders from the US Department of Defense. She possessed the high security classification TOP SECRET CRYPTO."
  41. ^Goodwins, Rupert (29 June 2000)."Echelon: How it works".ZDNet.Archived from the original on 2 February 2014. Retrieved28 January 2014.
  42. ^Campbell, Duncan (25 July 2000)."Inside Echelon".Heise Online.Archived from the original on 2 February 2014. Retrieved28 January 2014.
  43. ^Perrone, Jane (29 May 2001)."The Echelon spy network".The Guardian.Archived from the original on 3 February 2014. Retrieved28 January 2014.
  44. ^Poitras, Laura; Rosenbach, Marcel; Stark, Holger (20 December 2013)."Friendly Fire: How GCHQ Monitors Germany, Israel and the EU".Der Spiegel.Archived from the original on 25 January 2014. Retrieved30 January 2014.A map from the wealth of classified documents obtained by Snowden on the so-called "Fornsat" activities of the technical intelligence cooperation program -- informally known as the Five Eyes -- shows that the system of global satellite surveillance remained in operation.
  45. ^Ambinder, Marc (31 July 2013)."What's XKEYSCORE?".The Week.Archived from the original on 30 January 2014. Retrieved30 January 2014.FORNSAT simply means "foreign satellite collection," which refers to NSA tapping into satellites that process data used by other countries.
  46. ^Le Monde DiplomatiqueArchived 11 September 2010 at theWayback Machine, September 2010
  47. ^Anderson, Rick (21 June 2013)."Cray and the NSA: Seattle Supercomputers Help Spy Agency Mine Your Megadata".Seattle Weekly. Archived fromthe original on 15 May 2016.
  48. ^Troianello, Craig (19 April 2013)."NSA to close Yakima Training Center facility".Yakima Herald-Republic.Archived from the original on 28 January 2023. Retrieved28 January 2023.
  49. ^abEames, David (19 March 2010)."Waihopai a key link in global intelligence network".The New Zealand Herald.Archived from the original on 3 February 2014. Retrieved28 January 2014.Both Waihopai and the Tangimoana radio listening post near Palmerston North have been identified as key players in the United States-led Echelon spy programme.
  50. ^"GCSB To Remove Dishes And Radomes At Waihopai Station".www.scoop.co.nz. 11 November 2021.Archived from the original on 10 November 2021. Retrieved28 January 2023.
  51. ^Greisler, David S.; Stupak, Ronald J., eds. (2007).Handbook of technology management in public administration. CRC/Taylor & Francis. p. 592.ISBN 978-1420017014.
  52. ^"Teufelsberg mirrors Berlin's dramatic history".Deutsche Welle.Archived from the original on 22 February 2014. Retrieved28 January 2014.More than 1,000 people are said to have worked here around the clock, every day of the year. They were part of the global ECHELON surveillance network.
  53. ^Beddow, Rachel (19 April 2012)."Teufelsberg, Berlin's Undisputed King of Ghostowns, Set For Redevelopment".NPR.Archived from the original on 1 February 2014. Retrieved28 January 2014.The Teufelsberg mission is still shrouded in secrecy, but it's generally agreed that the station was part of the ECHELON network that listened in to the Eastern Bloc.
  54. ^According to a statement by Terence Dudlee, the speaker of the US Navy in London, in an interview to the German HR (Hessischer Rundfunk)
    "US-Armee lauscht von Darmstadt aus". Archived fromthe original on 30 June 2007. Retrieved19 August 2016. (German),hr online, 1 October 2004
  55. ^"CFS Leitrim".Archived from the original on 16 October 2021. Retrieved16 October 2021.
  56. ^"canadian military history".Archived from the original on 20 November 2020. Retrieved14 November 2020.
  57. ^The Codebreakers, Ch. 10, 11
  58. ^Keefe, Patrick Radden.Chatter: Uncovering the echelon surveillance network and the secret world of global eavesdropping. Random House Incorporated.
  59. ^abFor example:"Nicky Hager Appearance before the Euro ean Parliament ECHELON Committee". April 2001.Archived from the original on 21 October 2001. Retrieved2 July 2006.
  60. ^"NSA eavesdropping: How it might work".CNET News.com.Archived from the original on 14 July 2014. Retrieved27 August 2006.
  61. ^"Commercial Geostationary Satellite Transponder Markets for Latin America : Market Research Report".Archived from the original on 14 March 2012. Retrieved27 August 2006.
  62. ^Die Zeit: 40/1999 "Verrat unter Freunden" ("Treachery among friends", German), available at"Zeit.de". Archived from the original on 9 October 2008. Retrieved19 August 2007.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  63. ^"Amerikanen maakten met Echelon L&H kapot". daanspeak.com. 30 March 2002. Archived fromthe original on 8 February 2012. Retrieved28 March 2008. (Google's translation of the article into EnglishArchived 31 December 2018 at theWayback Machine).
  64. ^"The National Security Agency Declassified".nsarchive2.gwu.edu.Archived from the original on 25 October 2020. Retrieved31 October 2020.
  65. ^Bustillos, Maria (9 June 2013)."Our reflection in the N.S.A.'s PRISM".Archived 14 October 2013 at theWayback Machine.The New Yorker. Retrieved: 2013-10-12.
  66. ^"Thatcher 'spied on ministers'". BBC. 25 February 2000.Archived from the original on 21 October 2013. Retrieved15 October 2013.
  67. ^abLoeb, Vernon (12 December 1998)."NSA Admits to Spying on Princess Diana".The Washington Post.Archived from the original on 9 November 2017. Retrieved20 September 2017.
  68. ^"UK 'spied on UN's Kofi Annan'". BBC. 26 February 2004.Archived from the original on 29 October 2013. Retrieved21 September 2013.
  69. ^Tyler, Patrick E. (26 February 2004)."Ex-Minister Says British Spies Bugged Kofi Annan's Office".The New York Times.Archived from the original on 25 September 2013. Retrieved21 September 2013.
  70. ^"US diplomats spied on UN leadership".The Guardian. 28 November 2010.Archived from the original on 10 September 2013. Retrieved27 August 2013.
  71. ^Rosenbach, Marcel; Stark, Holger (29 November 2010)."Diplomats or Spooks? How US Diplomats Were Told to Spy on UN and Ban Ki-Moon".Der Spiegel.Archived from the original on 21 August 2013. Retrieved27 August 2013.
  72. ^"Echelon: Big brother without a cause".BBC News. 6 July 2000.Archived from the original on 7 January 2009. Retrieved27 August 2006.
  73. ^"Airbus's secret past".The Economist. 14 June 2003.Archived from the original on 21 October 2013. Retrieved15 October 2013.
  74. ^"Big Surveillance Project For the Amazon Jungle Teeters Over Scandals".The Christian Science Monitor.Archived from the original on 3 March 2016. Retrieved15 October 2013.
  75. ^David E. Sanger; Tim Weiner (15 October 1995)."Emerging Role For the C.I.A.: Economic Spy".The New York Times.Archived from the original on 10 July 2019. Retrieved15 October 2013.
  76. ^The Northwest Passage, Yakima Research Station (YRS) newsletter:Volume 2, Issue 1, January 2011.Archived 22 September 2015 at theWayback Machine.
  77. ^"Pine Gap"(PDF). Archived fromthe original(PDF) on 8 June 2011. Retrieved19 August 2016., Official Committee Hansard, Joint Standing Committee on Treaties, 9 August 1999. Commonwealth of Australia.
  78. ^Schmid, Gerhard (11 July 2001)."Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))"(PDF).Archived(PDF) from the original on 28 June 2019. Retrieved6 August 2018.
  79. ^Sattar, Majid (July 2013)."NSA-Affäre: Ja, meine Freunde, wir spionieren euch aus!".FAZ.NET (in German).Archived from the original on 21 November 2022. Retrieved21 November 2022.
  80. ^Staunton, Denis (16 April 1999)."Electronic spies torture German firms".The Irish Times.Archived from the original on 21 September 2018. Retrieved6 August 2018.

External links

[edit]
Wikimedia Commons has media related toEchelon.
Analysis
Devices and
communications
Tradecraft and
techniques
Operations
Collection
Human (HUMINT)
Clandestine
Espionage
Signals (SIGINT)
Measurement and
signature (MASINT)
Other
Analysis
Dissemination
Foreign
intelligence
Domestic
intelligence
Military
intelligence
Signals
intelligence
Imagery
intelligence
Financial
intelligence
Criminal
intelligence
Intelligence
community
Intelligence
alliances
Defunct
agencies
Related
topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=ECHELON&oldid=1311664365"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp