http://fr.wikipedia.org/wiki/Echelon
Echelon
Un article de Wikipédia, l'encyclopédie libre.
Pour les articles homonymes, voir Echelon (homonymie).
Echelon est un nom de code utilisé pendant de nombreuses années par les services de renseignements des États-Unis pour désigner une base d'interception des satellites de télécommunications commerciaux. Par extension, le Réseau Echelon désigne le système mondial d'interception des communications privées et publiques (SIGINT), élaboré par les États-Unis, le Royaume-Uni, le Canada, l’Australie et la Nouvelle-Zélande dans le cadre du traité UKUSA.Le réseau Echelon est géré conjointement par les services de renseignements des États membres du UKUSA :
- la NSA (National Security Agency) pour les États-Unis qui en est le principal contributeur et utilisateur ;
- le GCHQ (Government Communications Headquarters) pour le Royaume-Uni ;
- le CSTC (Centre de la sécurité des télécommunications Canada) pour le Canada ;
- la DSD (Defence Signals Directorate) pour l'Australie ;
- le GCSB (Government Communications Security Bureau) pour la Nouvelle-Zélande.
Il intercepte les télécopies, les communications téléphoniques, les courriels et, grâce à un puissant réseau d’ordinateurs, est capable de trier en fonction de certains termes les communications écrites et, à partir de l’intonation de la voix, les communications orales.
Bien que plusieurs autres pays aient mis en place des systèmes similaires, comme Frenchelon en France, il reste aujourd’hui le plus puissant au monde.
Ces réseaux peuvent être utilisés pour des actions militaires ou politiques.
2 000 personnes, dont 1 500 Américains, travaillent sur la base du Yorkshire au Royaume-Uni, la plus grosse hors des États-Unis. Les militantes du Women Peace Camp sont entrées plusieurs fois dans cette base, ont volé des documents et ont diffusé des informations au sujet d'Echelon.
Toutes les informations récoltées par le réseau Echelon sont analysées au quartier général de la NSA à Fort George G. Meade (Maryland, États-Unis).
Sommaire[masquer] |
Histoire[modifier]
Les origines d’Echelon dans le traité UKUSA[modifier]
En 1943, les États-Unis et le Royaume-Uni, alors engagés dans la Seconde Guerre mondiale, signent un accord de coopération dans l’interception des communications, l'accord Brusa. La machine Enigma, fleuron de la cryptographie nazie, ne résiste pas à cette alliance. Pour pérenniser cette entente au sortir de la guerre, ces deux pays signent en 1947 le traité UKUSA (United-Kingdom – United States of America). Ils sont rapidement rejoints par le Canada, l’Australie et la Nouvelle-Zélande. Des pays tiers (l'Allemagne de l'Ouest, la Norvège, la Turquie) signent ensuite des traités SIGINT avec les États-Unis, bénéficiant ainsi d'un accès restreint au réseau UKUSA[1].Le développement d'Echelon pendant la guerre froide[modifier]
Pendant les premières années, les pays membres de l'UKUSA se sont cantonnés à l’interception des messages entrant et sortant de leurs territoires respectifs et à l’écoute de certains pays limitrophes. Mais dans le cadre de la guerre froide, ils développent rapidement des outils plus performants, et à plus grand rayon d’action. Au milieu des années 1970, la première base Echelon voit le jour aux États-Unis. Elle sera la première d’un vaste réseau qui couvre aujourd’hui la Terre entière. Son nom est P415, mais il est plus connu sous le nom de Réseau Echelon.Plusieurs pays tiers rejoindront cette alliance – tels que l’Allemagne[1], la Norvège[1], la Turquie[1] ou la Corée du Sud [réf. nécessaire]. Ils n’auront toutefois qu’une importance secondaire, les cinq principaux pays de cette coalition se partageant les informations recueillies, sélectionnant celles auxquelles peuvent accéder les autres États membres et décidant quelles personnes, entreprises, ou États doivent être la cible du réseau.
Dévoilement du réseau Echelon[modifier]
Ce réseau est resté totalement inconnu du grand public pendant plus de 40 ans. C’est en 1988 qu’un journaliste écossais, Duncan Campbell, dévoile le projet Echelon, dans un article intitulé « Somebody's listening »[2]. À l'époque, celui-ci ne fait pas grand bruit et les médias s'y intéressent peu.En 1995, le gouvernement canadien reconnaît l'existence d'une collaboration internationale dans l'échange de renseignements extérieurs, suivi en mars 1999 par l'Australie qui affirme que son gouvernement « coopère effectivement avec des organisations équivalentes d'espionnage des signaux outre-mer sous l'égide de l'alliance UKUSA »[1].
En 1996, le journaliste néo-zélandais Nicky Hager publie son livre Secret Power, détaillant la participation néo-zélandaise au réseau. Parallèlement, les affaires d’espionnage économique se multiplient (Thomson-CSF, Airbus, AT&T, etc.).
Trois ans plus tard, les premières preuves écrites sont découvertes par des chercheurs de l’université George Washington (Washington). Deux documents déclassifiés par la NSA ont été découverts, l’un datant du 3 septembre 1991 qui précise la mission du centre de surveillance électronique de Sugar Grove en Virginie, l’autre du 15 juin 1995 relatant l’activation de certains centres d’interception sur les bases aériennes américaines. La NSA a toujours nié cette alliance.
Le Parlement européen demande ensuite au STOA plusieurs rapports sur l'existence d'Echelon et les moyens techniques et juridiques de protection contre cette forme d'espionnage électronique, qui seront notamment rédigés par Duncan Campbell, Franck Leprevost et Chris Elliot.
Les affaires supposées d'espionnage[modifier]
Espionnage économique[modifier]
- 1994 Airbus - McDonnell Douglas, vente d’avions à la Saudi Arabian Airlines ;
- 1994 Enercon, vol d’éléments techniques pour la constructions d’éoliennes ;
- 1994 Thomson CSF - Raytheon, interception des offres de l’entreprise française pour la construction d’un système de surveillance de la forêt amazonienne ;
- 1994 Accord général sur les tarifs douaniers et le commerce (GATT), interception des courriels des représentants européens ;
- 2002 Parlement européen, connaissance du mode de chiffrement des données du Parlement depuis plusieurs années.
Lutte contre la criminalité[modifier]
- 1993 : Il aurait permis d'espionner José Ignacio López de Arriortua, un cadre de General Motors parti chez Volkswagen en 1993 avec des documents secrets (Lopez a été reconnu coupable par contumace en mai 2000 par un jury fédéral des États-Unis)[3].
- 2007 : Lors de l'enlèvement de la fillette Madeleine McCann au Portugal, Scotland Yard aurait eu recours au réseau Echelon par l’intermédiaire du Government Communications Headquarters[4].
Les opposants[modifier]
Jam Echelon Day[modifier]
En 1999, un groupe d’« hacktivists » lance une campagne de mobilisation contre le système ECHELON en tirant parti de son prétendu point faible : son dictionnaire de mots-clés. Le 21 octobre 1999 est déclaré comme étant le « Jam Echelon Day », la journée d’engorgement du réseau ECHELON. Les internautes sont invités à ajouter à tous leurs messages électroniques une liste de mots-clés propres à faire réagir le système de tri. Selon les militants, le système d’écoutes pourrait alors être submergé par la masse de messages à traiter. Mais bien vite cette affirmation est mise en doute. William Knowlse qui fut le premier à préparer une liste de mots-clés dès 1998 déclare « J’ai amassé ces mots-clés au fil de mes lectures, sans vraiment penser à déstabiliser les services secrets […] Je doute qu’une liste vieille de plus de deux ans puisse créer des ennuis à la NSA ». Duncan Campbell, spécialiste du réseau ECHELON, ajoutera même « Il suffit aux employés de la NSA de demander à leurs ordinateurs d’ignorer les messages contenant plus d’une dizaine de mots-clés. Le réseau ECHELON serait alors protégé et ne subirait aucun engorgement ».En 2001, l’action est relancée avec un but plus informatif. Son principal objectif est de faire comprendre aux citoyens que la liberté de pensée et d’expression est menacée. Le second objectif est de fournir des avis, des logiciels pour sécuriser les communications des entreprises et des particuliers. Cependant le message passe mal, et a des difficultés à sortir d’un cocon d’internautes spécialisés.
Women Peace Camp à Menwith Hill (Royaume-Uni)[modifier]
RAF Menwith Hill (en) (Field Station F83), dans le Yorkshire, au Royaume-Uni, est la plus grande base du réseau Echelon[1]. Près de 2 000 personnes y travaillent dont plus de 1 200 Américains[5]. La base F83 a pour fonction principale la collecte et le traitement des données des satellites SIGINT; sa seconde fonction majeure (Moonpenny) consiste à intercepter les données des satellites civils ou militaires d'autres pays[1]. Gérée en collaboration avec le GCHQ britannique, elle est sous l'autorité de la NSA[1].Depuis au moins 1975, la Post Office Telecom britannique (devenu British Telecom, BT) branchait des câbles par lesquels pouvaient transiter les appels téléphoniques internationaux émis depuis le Royaume-Uni vers Menwith Hill[5]. En 1992, un nouveau câble optique par lequel transitaient plus de 100 000 appels téléphoniques fut dévié vers Menwith Hill par BT[5].
Un groupe de femmes, la Women Peace Camp, âgées en moyenne de plus de 60 ans, s'oppose à cette présence. Dès 1994, elles installent des caravanes en face de la base : évacuées sans ménagement, elles alertent l’opinion publique. Pendant plus de 2 ans, elles se sont introduites plusieurs fois dans la base et ont fait ses poubelles sans éveiller les soupçons. Grâce à des photocopies ratées des fax elles réussissent à mettre au jour près de 250 systèmes fonctionnant à Menwith Hill et l'existence de plusieurs bases implantées sur le sol britannique inconnues jusqu’à présent.
Suite à leurs multiples actions, elles multiplient les procès et les périodes d’incarcération. Ainsi Ann Lee a été condamnée en 2007 à deux mois de prison ferme pour avoir découpé une grille de sécurité. Helen John, âgée de plus de 60 ans, a été condamnée 34 fois et a purgé 18 mois de prison.
Stations d’interception[modifier]
Voici les listes des stations connues ou supposées participer au réseau Echelon :Principales stations[modifier]
Station (Désignation) | Localisation | Opérateur | Autres informations |
---|---|---|---|
Yakima Research Station (YRS) (USD-110)[6] | Yakima, État de Washington | NSA[1] Detachment 4, 544th Intelligence Group | première station ECHELON Fermeture annoncée en 2013[7] |
Sugar Grove | Virginie-Occidentale | Naval Security Group Activity Sugar Grove Detachment 3, 544th Intelligence Group | Fermeture prévue en 2016[8] |
Sabana Seca | Porto Rico | Naval Security Group Activity Sabana Seca Detachment 2, 544th Intelligence Group | |
SFC Leitrim (CAF-97)[1] | Ontario, Canada | CSTC | |
RAF Menwith Hill (USD-1000)[6] | près de Harrogate, Yorkshire, Royaume-Uni | NSA[1] | |
GCHQ Bude (anciennement CSO Morwenstow) | Cornouailles, Royaume-Uni | Composite Signals Organisation (branche civile du GCHQ) | C'est la plus grande station d'interception Echelon[1] |
Guam | océan Pacifique | US Navy[1] | |
Australian Defence Satellite Communications Station (ADSCS) | Kojarena près de Geraldton, Australie-Occidentale | DSD | |
Waihopai (NZC-333[6]) | Nouvelle-Zélande | GCSB | fonctionnant depuis fin 1991[9] |
Autres stations[modifier]
- Alert, île d'Ellesmere, Nunavut, Canada
- Ayios Nikolaos, Chypre (pour le Royaume-Uni)
- Bremerhaven, Allemagne (pour le Royaume-Uni)
- Buckley Air Force Base, Colorado, États-Unis
- Diego Garcia, océan Indien (Royaume-Uni)
- Digby, Lincolnshire, Royaume-Uni
- Elmendorf, Alaska (pour les États-Unis)
- Feltwell, Norfolk, Royaume-Uni
- Fort Gordon, Géorgie, États-Unis : NSA/CSS Georgia (anciennement le Gordon Regional SIGINT Operations Center ou Gordon RSOC)
- Gander, Terre-Neuve-et-Labrador, Canada
- Gibraltar (Royaume-Uni)
- Île de l'Ascension, océan Atlantique (administré par la Composite Signals Organisation (CSO), branche civile du GCHQ[1])
- Karamursel, Turquie (pour les États-Unis)
- Kunia, Hawaii : NSA/CSS Hawaii (anciennement Kunia RSOC) administré par le Naval Security Group américain[1]
- Malte (pour le Royaume-Uni)
- Masset, Colombie-Britannique, Canada
- Fort Meade, Maryland, États-Unis (siège de la NSA)[1]
- Medina Annex, Lackland Air Force Base, près de San Antonio, Texas, États-Unis : Texas Cryptology Center (anciennement Medina RSOC) dirigé par le service de renseignements de l'US Air Force[1])
- Misawa, Japon (contrôlé par l'Air Intelligence Agency, le service de renseignements de l'US Air Force[1])
- Osan, Corée du Sud (pour les États-Unis)
- Pine Gap, près d'Alice Springs, Australie
- Shoal Bay, près de Darwin, Territoire du Nord, Australie (selon les sources australiennes, Shoal Bay ne fait pas en fait partie du réseau ECHELON, dans la mesure où les données brutes d'information ne sont pas transmises aux États-Unis et autres membres du traité UKUSA[9].)
- Rota, Espagne (pour les États-Unis)
- Silvermine, près du Cap, Afrique du Sud (pour les États-Unis)
- Tangimoana, Nouvelle-Zélande
- West Cape, Australie-Occidentale, Australie (États-Unis)
Anciennes stations[modifier]
- Bad Aibling, Allemagne (pour les États-Unis) : fermée en 2004 [réf. nécessaire] (directement dirigée par la NSA et par des civils jusqu'en 1995[1])
- Chicksands, Bedfordshire, Royaume-Uni : retrait du personnel de l'USAF en 1997
- Clark, Philippines (pour les États-Unis) : fermée en 1997
- Behshahr et Kapkan (stations ELINT de la CIA appelées Tacksman I et II), Iran (pour les États-Unis) : évacuées en 1979 suite à la Révolution iranienne
- Little Sai Wan, Hong Kong (pour le Royaume-Uni) : fermée en 1982
- Teufelsberg, Berlin-Ouest, Allemagne (pour les États-Unis) : fermée en 1991
Voir aussi[modifier]
Bibliographie[modifier]
- (en) Duncan Campbell, « They've got it taped », New Statesman, 12 août 1988, p. 10-12 [texte intégral]
- (en) Nicky Hager, Secret Power : New Zealand's Role in the International Spy Network, Nelson, Nouvelle-Zélande, Craig Potton Publishing, 1996 (ISBN 0-9088-0235-8 et 978-0-908802-35-7) [lire en ligne]
- (en) Jeffrey Richelson, « Desperately seeking signals », The Bulletin of the Atomic Scientists, vol. 56, no 2, mars/avril 2000, p. 47-51 [texte intégral]
- Arthur Paecht, Rapport d’information sur les systèmes de surveillance et d’interception électronique pouvant mettre en cause la sécurité nationale. Assemblée nationale (France), 11 octobre 2000. 89 pages.
- Gerhard Schmid, Rapport sur l’existence d’un système d’interception mondial des communications privées et économiques, système d’interception ECHELON. Parlement européen, 11 juillet 2001. 202 pages. Rapport A5-02-64/2001
- (en) Development of surveillance technology and risk of abuse of economic information, panel Science and Technology Options Assessment (STOA) du Parlement Européen, décembre 1999
- volume 1/5 : Peggy Becker, Presentation and Analysis [lire en ligne]
- volume 2/5 : Duncan Campbell, The state of the art in communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to COMINT targetting and selection, including speech recognition [lire en ligne] ou Interception Capabilities 2000 (édition augmentée traduite en français : Duncan Campbell, Surveillance électronique planétaire, Paris, éditions Allia, 2001 (réimpr. 2005) [lire en ligne])
- volume 3/5 : Franck Leprevost, Encryption and cryptosystems in electronic surveillance: a survey of the technology assessment issues [lire en ligne]
- volume 4/5 : Chris Elliot, The Legality of interception of electronic communications: a concise survey of the principal legal issues and instruments under international, european and national law [lire en ligne]
- volume 5/5 : Nikos Bogolikos, The perception of economic risks arising from the potential vulnerability of electronic commercial media to interception] [lire en ligne]
- Franck Leprevost & Bertrand Warusfel, Echelon : origines et perspectives d'un débat transnational, Annuaire Français de Relations Internationales, volume 2, 2001, Ed. Bruylant, pp. 865-888.
- S. Lizin, Ch. Van Parys. Rapport sur l’existence éventuelle d’un réseau d’interception des communications, nommé « Echelon ». Sénat et Chambre des représentants de Belgique, 25 février 2002. 70 pages.
Filmographie[modifier]
- Echelon, le pouvoir secret, documentaire de David Korn-Brzoza (coproduction France 2 - Kuiv Productions) où différents anciens membres du réseau témoignent.
- Conspiracy, film de fiction de Greg Marcks (2010) : Echelon est programmé pour une conspiration[10]
Articles connexes[modifier]
- Frenchelon (France)
- Swechelon (Suède)
- Onyx (Suisse)
- High frequency active auroral research program (HAARP)
- TEMPEST, système de visualisation des écrans d'ordinateurs (et a priori de tout système émettant de quelconques ondes) à distance.
- Fuite d'information
- Perfect Citizen
Liens externes[modifier]
- Souriez on vous espionne, un livre-enquête au Cherche Midi
- Site sur le réseau ECHELON
- Commission temporaire de l'enquête du Parlement européen sur le réseau Echelon (18 mai 2001) [PDF]
- Rapport d'information de l'Assemblée nationale française sur le réseau Echelon (11 octobre 2000)
- Rapport final de l'enquête du Parlement européen sur le réseau Echelon (11 juillet 2001) [PDF]
- Video documentaire sur Echelon
- (en) "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)". Wired, avril 2012.
Notes et références[modifier]
- Duncan Campbell, Surveillance électronique planétaire, p. 17-24 spécifiquement sur l'UKUSA.
- Duncan Campbell, Somebody's listening [archive], The New Statesman, 12 août 1988, pages 10-12
- (en) Série d'articles du New York Times [archive]
- (fr) Le réseau Echelon au secours de Maddie, Alain Charret, Centre français de recherche sur le renseignement [archive]
- Duncan Campbell, BT condemned for listing cables to US sigint station [archive], 4 septembre 1997
- Nicky Hager, Secret Power, p. 149
- (en) Craig Troianello, « NSA to close Yakima Training Center facility », Yakima Herald-Republic, 4 avril 2013 [texte intégral [archive] (page consultée le 7 avril 2013)]
- Nearly 200 West Virginia Navy Sailors and Their Families to Relocate [archive], WHSV.com, 27 septembre 2012
- Duncan Campbell, Surveillance électronique planétaire, p. 77
- http://www.allocine.fr/film/fichefilm_gen_cfilm=143031.html [archive]
Echelon
Jump to: navigation, search
For other uses, see Echelon (disambiguation).
Intercept Echelon Network located Menwith Hill (UK) stations.
Countries participating in the UKUSA treaty:
Australia
Canada
United States
United Kingdom
New ZealandEchelon is a code name used for many years by the intelligence services of the United States to designate a basic interception of commercial telecommunications satellite. By extension, the Echelon Network is the global system for the interception of private and public communications (SIGINT), developed by the United States, the United Kingdom, Canada, Australia and New Zealand under the Treaty UKUSA.
The Echelon network is managed jointly by the intelligence services of the Member States of the UKUSA:
NSA (National Security Agency) for the United States, which is the main contributor and user;
GCHQ (Government Communications Headquarters) for the United Kingdom;
CSEC (Communications Security Establishment Canada) for Canada;
DSD (Defence Signals Directorate) for Australia;
the GCSB (Government Communications Security Bureau) in New Zealand.
It is a global network, supported by artificial satellites, extensive tapping located in the United States bases, Canada (Leitrim), United Kingdom (Morwenstow), Australia (Pine Gap) and New Zealand (at Waihopai), small intercept stations in embassies, and the submarine Seawolf class USS Jimmy Carter, entered service in 2005 to listen to the submarine cable telecommunications.
It intercepts faxes, telephone calls, emails, and through a strong network of computers, is able to sort them according to certain terms and written communications, from the tone of voice, oral communications.
While many other countries have implemented similar systems, as Frenchelon in France, there is now the most powerful in the world.
These networks can be used for military or political actions.
2,000 people, including 1,500 Americans, working on the basis of Yorkshire in the United Kingdom, the largest outside the United States. The Women's Peace Camp activists entered several times in this database, stole documents and disseminated information about Echelon.
All information collected by the Echelon network are analyzed to NSA headquarters at Fort George G. Meade (Maryland, USA).
Summary
[Hide] 1 History 1.1 Origins of Echelon in the UKUSA treaty
1.2 The development of Echelon during the Cold War
1.3 Unveiling of Echelon
2 alleged business espionage 2.1 Economic Espionage
2.2 Fight against crime
3 Opponents 3.1 Jam Echelon Day
3.2 Women Peace Camp at Menwith Hill (UK)
4 Stations 4.1 Key interception stations
4.2 Other stations
4.3 Old stations
5 See also 5.1 Bibliography
5.2 Filmography
5.3 Related Items
5.4 External links
6 Notes and references
History [edit]
The origins of Echelon in the UKUSA Treaty [edit]
In 1943, the United States and the United Kingdom, while engaged in World War II, signed a cooperation agreement in the interception of communications, Brusa agreement. The Enigma, flagship of the Nazi cryptography machine, do not resist this alliance. To sustain this agreement at the end of the war, the two countries signed in 1947 UKUSA Treaty (United-Kingdom - United States of America). They are soon joined by Canada, Australia and New Zealand. Third countries (West Germany, Norway, Turkey) then SIGINT sign treaties with the United States and who have less access to UKUSA1 network.
Echelon development during the Cold War [edit]
During the early years, members of the UKUSA countries are confined to intercept incoming and outgoing messages of their respective territories and to listen to some neighboring countries. But in the context of the Cold War, they quickly develop better tools, and greater range. In the mid 1970s, the first base Echelon was born in the United States. It will be the first of a vast network that now covers the entire Earth. His name is P415, but it is known as Echelon Network.
Several third countries will join the alliance - such as Germany.1, Norway1, Turkey1 or South Korea [ref. needed]. They will, however, of secondary importance, the top five countries in the coalition share the information gathered, selecting those that can access the other Member States and deciding which individuals, companies, or states should be the target network.
Unveiling of Echelon [edit]
This network was totally unknown to the general public for over 40 years. In 1988, a Scottish journalist, Duncan Campbell reveals the Echelon project, in an article entitled "Somebody's listening" 2. At the time, it does not make much noise and media have little interest.
In 1995, the Canadian government recognizes the existence of an international collaboration in the exchange of foreign intelligence, followed in March 1999 by Australia's claim that his government "effectively cooperates with equivalent organizations overseas signals intelligence Sea under the auspices of the UKUSA alliance "1.
In 1996, the New Zealand journalist Nicky Hager published his book Secret Power, New Zealand retailer participation in the network. Meanwhile, cases of economic espionage are increasing (Thomson-CSF, Boeing, AT & T, etc..).
Three years later, the first written evidence is discovered by researchers at George Washington University (Washington). Two documents declassified by the NSA were discovered, one dated September 3, 1991, which states the mission of the center of electronic surveillance of Sugar Grove, Virginia, one of 15 June 1995 relating the activation of certain interception centers on U.S. air bases. The NSA has always denied this alliance.
Parliament then asked the STOA several reports on the existence of Echelon and the technical and legal means of protection against this form of electronic espionage, which will include written by Duncan Campbell, Frank Leprevost and Chris Elliot.
Cases of alleged espionage [edit]
Economic espionage [edit]
Airbus 1994 - McDonnell Douglas, sale of aircraft to Saudi Arabian Airlines;
Enercon 1994, vol technical elements for the construction of wind turbines;
1994 Thomson CSF - Raytheon interception offers the French company to build a monitoring system of the Amazon rainforest;
1994 General Agreement on Tariffs and Trade (GATT), interception of emails European representatives;
2002 European Parliament knowledge of how encryption of Parliament for several years.
Fight against crime [edit]
1993: It would have to spy José Ignacio López de Arriortua, a part of General Motors, Volkswagen party in 1993 with secret documents (Lopez was convicted in absentia in May 2000 by a federal jury in the United States) 3.
2007: When removing the girl Madeleine McCann in Portugal, Scotland Yard have used the Echelon network through the Government Communications Headquarters4.
Opponents [edit]
Jam Echelon Day [edit]
In 1999, a group of "hacktivists" launched a mobilization campaign against the ECHELON system by leveraging its alleged weakness: his dictionary of keywords. October 21, 1999 is declared as the "Jam Echelon Day", the day ECHELON network congestion. Users are encouraged to add to all their emails a list of keywords specific to react the sorting system. According to activists, the tapping system could then be overwhelmed by the mass of messages to be processed. But soon this statement is in doubt. William Knowlse who was the first to prepare a list of keywords in 1998 said "I raised these keywords through my readings, without really thinking about destabilize the secret service [...] I doubt that old list more than two years could create trouble for the NSA. " Duncan Campbell, a specialist in network ECHELON even add "Just the NSA employees to ask their computers to ignore messages containing more than a dozen keywords. The ECHELON network would be protected and there would be no congestion. "
In 2001, the action is restarted with a more informative. Its main objective is to make citizens understand that freedom of thought and expression is under threat. The second objective is to provide advice, software for secure communications businesses and individuals. However the message is wrong, and has trouble getting out of a cocoon specialized Internet.
Women Peace Camp at Menwith Hill (UK) [edit]
RAF Menwith Hill (en) (Field Station F83), Yorkshire, United Kingdom, is the largest base of Echelon1 network. Nearly 2,000 people work more than 1200 Americans.5. The F83 base's main function is the collection and processing of data SIGINT satellites, the second major function (Moonpenny) is to intercept data from military or civilian satellites other countries1. Managed in collaboration with the British GCHQ, is under the authority of the NSA1.
Since at least 1975, the British Post Office Telecom (now British Telecom, BT) plugged the cables which could pass international phone calls from the United Kingdom to Menwith Hill5. In 1992, a new optical cable which transited more than 100,000 phone calls were diverted to Menwith Hill in BT5.
A group of women, the Women's Peace Camp, mean age 60 years, opposes the presence. By 1994, they settled caravans across the base: removed unceremoniously, they alert the public. For over two years, they have introduced several times in the database and have its garbage without arousing suspicion. With photocopies missed faxes they manage to uncover nearly 250 systems operating at Menwith Hill and the existence of multiple databases located on British soil so far unknown.
Following their multiple actions, they multiply the trials and periods of incarceration. And Ann Lee was sentenced in 2007 to two months in prison for having cut a security gate. Helen John, aged 60 years, was convicted 34 times and served 18 months in prison.
Intercept stations [edit]
A radome at Menwith Hill
Bunker monitoring Silvermine (South Africa)Here are the lists of known or suspected participation in Echelon stations:
Main stations [edit]
Station
(Designation)
Location
Operator
Other information
Yakima Research Station (YRS) (USD-110) 6
Yakima, Washington
NSA1
Detachment 4, 544th Intelligence Group
first station ECHELON
Closing Announced 20137
Sugar Grove
West Virginia
Naval Security Group Activity Sugar Grove
Detachment 3, 544th Intelligence Group
Slated for closure in 20168
Sabana Seca
Puerto Rico
Naval Security Group Activity Sabana Seca
Detachment 2, 544th Intelligence Group
Leitrim (CAF-97) 1
Ontario, Canada
CSEC
RAF Menwith Hill (USD-1000) 6
near Harrogate, Yorkshire, UK
NSA1
GCHQ Bude
(Formerly CSO Morwenstow)
Cornwall, UK
Composite Signals Organisation (civil branch of GCHQ)
This is the largest interception station Echelon1
Guam
Pacific Ocean
U.S. Navy1
Australian Defence Satellite Communications Station (ADSCS)
Kojarena near Geraldton, Western Australia
DSD
Waihopai (NZC-3336)
New Zealand
GCSB
operating since the end of 19919
Other stations [edit]
Alert, Ellesmere Island, Nunavut, Canada
Ayios Nikolaos, Cyprus (for the UK)
Bremerhaven, Germany (UK)
Buckley Air Force Base, Colorado, United States
Diego Garcia, Indian Ocean (UK)
Digby, Lincolnshire, United Kingdom
Elmendorf, Alaska (for United States)
Feltwell, Norfolk, UK
Fort Gordon, Georgia, United States: NSA / CSS Georgia (formerly the Gordon Regional SIGINT Operations Center or Gordon RSOC)
Gander, Newfoundland and Labrador, Canada
Gibraltar (United Kingdom)
Ascension Island, Atlantic Ocean (administered by the Composite Signals Organisation (CSO), the civil branch GCHQ1)
Karamursel, Turkey (for the U.S.)
Kunia, Hawaii: NSA / CSS Hawaii (formerly Kunia RSOC) administered by the Naval Security Group U.S. English1
Malta (in the UK)
Masset, British Columbia, Canada
Fort Meade, Maryland, United States (head of the NSA) 1
Medina Annex, Lackland Air Force Base, near San Antonio, Texas, USA: Texas Cryptology Center (formerly Medina RSOC) led by the intelligence service of the U.S. Air Force1)
Misawa, Japan (controlled by the Air Intelligence Agency, the intelligence service of the U.S. Air Force1)
Osan, South Korea (for United States)
Pine Gap, near Alice Springs, Australia
Shoal Bay near Darwin, Northern Territory, Australia (according to Australian sources, Shoal Bay is not actually part of the ECHELON network, since the raw information data are not transmitted in the United States and other members UKUSA9 Treaty.)
Rota, Spain (for the U.S.)
Silvermine near Cape Town, South Africa (for the U.S.)
Tangimoana, New Zealand
West Cape, Western Australia, Australia (United States)
Old stations [edit]
Bad Aibling, Germany (the United States): Closed in 2004 [ref. needed] (directly managed by the NSA and civilians until 19951)
Chicksands, Bedfordshire, United Kingdom: removal of USAF personnel in 1997
Clark, Philippines (for the U.S.): Closed in 1997
Behshahr and Kapkan (ELINT CIA stations called tacksman I and II), Iran (to the U.S.): removed in 1979 after the Iranian Revolution
Little Sai Wan, Hong Kong (for the UK): Closed in 1982
Teufelsberg, West Berlin, Germany (for the U.S.): Closed in 1991
See also [edit]
On other Wikimedia projects:
Echelon on Wikimedia Commons
References [edit]
(En) Duncan Campbell, "They've got it taped," New Statesman, 12 August 1988, p. 10-12 [Full text]
(En) Nicky Hager, Secret Power: New Zealand's Role in the International Spy Network, Nelson, New Zealand, Craig Potton Publishing, 1996 (ISBN 0-9088-0235-8 and 978-0-908802-35-7) [ read online]
(En) Jeffrey Richelson, "Desperately seeking signals," The Bulletin of the Atomic Scientists, vol. 56, No. 2, March / April 2000, p. 47-51 [Full text]
Arthur Paecht Information Report on monitoring systems and electronic interception could jeopardize national security. National Assembly (France), 11 October 2000. 89 pages.
Gerhard Schmid, Report on the existence of a global system for intercepting private and commercial communications, ECHELON interception system. European Parliament, 11 July 2001. 202 pages. A5-02-64/2001 report
(En) Development of monitoring technology and risk of abuse of economic information panel Science and Technology Options Assessment (STOA) of the European Parliament in December 1999 volume 1/5: Peggy Becker, Analysis and Presentation [read online]
Volume 2/5: Duncan Campbell, The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence Purposes of intercepted broadband multi-language leased or common carrier systems, and Its applicability to COMINT targetting and selection, Including speech recognition [ read online] or Interception Capabilities 2000 (expanded edition translated into French: Duncan Campbell, Global Electronic Surveillance, Paris, Editions Allia, 2001 (reprint 2005) [read online])
Volume 3/5: Franck Leprevost, Encryption and cryptosystems in electronic monitoring: a survey of the technology assessment issues [read online]
Volume 4/5: Chris Elliot, The Legality of interception of electronic communications: a concise survey of the principal legal issues and instruments under international, european and national law [read online]
Volume 5/5: Nikos Bogolikos, The perception of Economic Risks Arising from the potential vulnerability of electronic business media to interception] [read online]
Franck Leprevost & Bertrand Warusfel, Echelon: origins and prospects for transnational debate, French Directory International Relations, Volume 2, 2001, Ed Bruylant, p. 865-888.
S. Lizin, Ch Van Parys. Report on the possible existence of a network of interception of communications, called "Echelon". Senate and House of Representatives of Belgium, February 25, 2002. 70 pages.
Filmography [edit]
Echelon, the secret power, documentary-Brzoza David Korn (co-France 2 - Kuiv Productions) where several former members of the network show.
Conspiracy fiction film Greg Marcks (2010): Echelon is scheduled for conspiration10
Related Articles [edit]
Frenchelon (France)
Swechelon (Sweden)
Onyx (Switzerland)
High frequency active auroral research program (HAARP)
TEMPEST display system computer screens (and a priori any system emitting any wave) distance.
Information Leakage
Perfect Citizen
External links [edit]
Smile you will spy a book survey Cherche Midi
Site on the ECHELON network
Temporary Committee of the European parliament on the Echelon network (18 May 2001) [PDF]
Information of the French National Assembly report on Echelon (11 October 2000) network
Final Report of the investigation of the European Parliament on the Echelon network (11 July 2001) [PDF]
Video documentary on Echelon
(In) "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired, April 2012.
Notes and references [edit]
1. ↑ a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r and s Duncan Campbell, Global monitoring electronics, p. 17-24 specifically the UKUSA.
2. ↑ Duncan Campbell, Somebody's listening [archive], The New Statesman, 12 August 1988, pages 10-12
3. ↑ (en) Series of articles in the New York Times [archive]
4. ↑ (en) The Echelon network to rescue Maddie, Alain Charret, French Centre for Research on Intelligence [archive]
↑ 5., B and c Duncan Campbell, BT Condemned for listing cables to U.S. SIGINT station [archive], September 4, 1997
6. ↑ a, b and c Nicky Hager, Secret Power, p. 149
↑ Troianello 7,. (In) Craig "NSA to close Yakima Training Center facility," Yakima Herald-Republic, April 4, 2013 [Full text [archive] (accessed April 7, 2013)]
8. ↑ Nearly 200 West Virginia Navy Sailors and Their Families to Relocate [archive] WHSV.com, September 27, 2012
9. ↑ a and b Duncan Campbell, Global Monitoring electronic, p. 77
10. ↑ http://www.allocine.fr/film/fichefilm_gen_cfilm=143031.html [archive]
IT Security Portal
Portal cryptology
Intelligence Portal
Portal telecommunications
Portal U.S.
Categories: Information SIGINTComputer SecurityConspiracy Theory
| [+]
Jump to: navigation, search
For other uses, see Echelon (disambiguation).
Intercept Echelon Network located Menwith Hill (UK) stations.
Countries participating in the UKUSA treaty:
Australia
Canada
United States
United Kingdom
New ZealandEchelon is a code name used for many years by the intelligence services of the United States to designate a basic interception of commercial telecommunications satellite. By extension, the Echelon Network is the global system for the interception of private and public communications (SIGINT), developed by the United States, the United Kingdom, Canada, Australia and New Zealand under the Treaty UKUSA.
The Echelon network is managed jointly by the intelligence services of the Member States of the UKUSA:
NSA (National Security Agency) for the United States, which is the main contributor and user;
GCHQ (Government Communications Headquarters) for the United Kingdom;
CSEC (Communications Security Establishment Canada) for Canada;
DSD (Defence Signals Directorate) for Australia;
the GCSB (Government Communications Security Bureau) in New Zealand.
It is a global network, supported by artificial satellites, extensive tapping located in the United States bases, Canada (Leitrim), United Kingdom (Morwenstow), Australia (Pine Gap) and New Zealand (at Waihopai), small intercept stations in embassies, and the submarine Seawolf class USS Jimmy Carter, entered service in 2005 to listen to the submarine cable telecommunications.
It intercepts faxes, telephone calls, emails, and through a strong network of computers, is able to sort them according to certain terms and written communications, from the tone of voice, oral communications.
While many other countries have implemented similar systems, as Frenchelon in France, there is now the most powerful in the world.
These networks can be used for military or political actions.
2,000 people, including 1,500 Americans, working on the basis of Yorkshire in the United Kingdom, the largest outside the United States. The Women's Peace Camp activists entered several times in this database, stole documents and disseminated information about Echelon.
All information collected by the Echelon network are analyzed to NSA headquarters at Fort George G. Meade (Maryland, USA).
Summary
[Hide] 1 History 1.1 Origins of Echelon in the UKUSA treaty
1.2 The development of Echelon during the Cold War
1.3 Unveiling of Echelon
2 alleged business espionage 2.1 Economic Espionage
2.2 Fight against crime
3 Opponents 3.1 Jam Echelon Day
3.2 Women Peace Camp at Menwith Hill (UK)
4 Stations 4.1 Key interception stations
4.2 Other stations
4.3 Old stations
5 See also 5.1 Bibliography
5.2 Filmography
5.3 Related Items
5.4 External links
6 Notes and references
History [edit]
The origins of Echelon in the UKUSA Treaty [edit]
In 1943, the United States and the United Kingdom, while engaged in World War II, signed a cooperation agreement in the interception of communications, Brusa agreement. The Enigma, flagship of the Nazi cryptography machine, do not resist this alliance. To sustain this agreement at the end of the war, the two countries signed in 1947 UKUSA Treaty (United-Kingdom - United States of America). They are soon joined by Canada, Australia and New Zealand. Third countries (West Germany, Norway, Turkey) then SIGINT sign treaties with the United States and who have less access to UKUSA1 network.
Echelon development during the Cold War [edit]
During the early years, members of the UKUSA countries are confined to intercept incoming and outgoing messages of their respective territories and to listen to some neighboring countries. But in the context of the Cold War, they quickly develop better tools, and greater range. In the mid 1970s, the first base Echelon was born in the United States. It will be the first of a vast network that now covers the entire Earth. His name is P415, but it is known as Echelon Network.
Several third countries will join the alliance - such as Germany.1, Norway1, Turkey1 or South Korea [ref. needed]. They will, however, of secondary importance, the top five countries in the coalition share the information gathered, selecting those that can access the other Member States and deciding which individuals, companies, or states should be the target network.
Unveiling of Echelon [edit]
This network was totally unknown to the general public for over 40 years. In 1988, a Scottish journalist, Duncan Campbell reveals the Echelon project, in an article entitled "Somebody's listening" 2. At the time, it does not make much noise and media have little interest.
In 1995, the Canadian government recognizes the existence of an international collaboration in the exchange of foreign intelligence, followed in March 1999 by Australia's claim that his government "effectively cooperates with equivalent organizations overseas signals intelligence Sea under the auspices of the UKUSA alliance "1.
In 1996, the New Zealand journalist Nicky Hager published his book Secret Power, New Zealand retailer participation in the network. Meanwhile, cases of economic espionage are increasing (Thomson-CSF, Boeing, AT & T, etc..).
Three years later, the first written evidence is discovered by researchers at George Washington University (Washington). Two documents declassified by the NSA were discovered, one dated September 3, 1991, which states the mission of the center of electronic surveillance of Sugar Grove, Virginia, one of 15 June 1995 relating the activation of certain interception centers on U.S. air bases. The NSA has always denied this alliance.
Parliament then asked the STOA several reports on the existence of Echelon and the technical and legal means of protection against this form of electronic espionage, which will include written by Duncan Campbell, Frank Leprevost and Chris Elliot.
Cases of alleged espionage [edit]
Economic espionage [edit]
Airbus 1994 - McDonnell Douglas, sale of aircraft to Saudi Arabian Airlines;
Enercon 1994, vol technical elements for the construction of wind turbines;
1994 Thomson CSF - Raytheon interception offers the French company to build a monitoring system of the Amazon rainforest;
1994 General Agreement on Tariffs and Trade (GATT), interception of emails European representatives;
2002 European Parliament knowledge of how encryption of Parliament for several years.
Fight against crime [edit]
1993: It would have to spy José Ignacio López de Arriortua, a part of General Motors, Volkswagen party in 1993 with secret documents (Lopez was convicted in absentia in May 2000 by a federal jury in the United States) 3.
2007: When removing the girl Madeleine McCann in Portugal, Scotland Yard have used the Echelon network through the Government Communications Headquarters4.
Opponents [edit]
Jam Echelon Day [edit]
In 1999, a group of "hacktivists" launched a mobilization campaign against the ECHELON system by leveraging its alleged weakness: his dictionary of keywords. October 21, 1999 is declared as the "Jam Echelon Day", the day ECHELON network congestion. Users are encouraged to add to all their emails a list of keywords specific to react the sorting system. According to activists, the tapping system could then be overwhelmed by the mass of messages to be processed. But soon this statement is in doubt. William Knowlse who was the first to prepare a list of keywords in 1998 said "I raised these keywords through my readings, without really thinking about destabilize the secret service [...] I doubt that old list more than two years could create trouble for the NSA. " Duncan Campbell, a specialist in network ECHELON even add "Just the NSA employees to ask their computers to ignore messages containing more than a dozen keywords. The ECHELON network would be protected and there would be no congestion. "
In 2001, the action is restarted with a more informative. Its main objective is to make citizens understand that freedom of thought and expression is under threat. The second objective is to provide advice, software for secure communications businesses and individuals. However the message is wrong, and has trouble getting out of a cocoon specialized Internet.
Women Peace Camp at Menwith Hill (UK) [edit]
RAF Menwith Hill (en) (Field Station F83), Yorkshire, United Kingdom, is the largest base of Echelon1 network. Nearly 2,000 people work more than 1200 Americans.5. The F83 base's main function is the collection and processing of data SIGINT satellites, the second major function (Moonpenny) is to intercept data from military or civilian satellites other countries1. Managed in collaboration with the British GCHQ, is under the authority of the NSA1.
Since at least 1975, the British Post Office Telecom (now British Telecom, BT) plugged the cables which could pass international phone calls from the United Kingdom to Menwith Hill5. In 1992, a new optical cable which transited more than 100,000 phone calls were diverted to Menwith Hill in BT5.
A group of women, the Women's Peace Camp, mean age 60 years, opposes the presence. By 1994, they settled caravans across the base: removed unceremoniously, they alert the public. For over two years, they have introduced several times in the database and have its garbage without arousing suspicion. With photocopies missed faxes they manage to uncover nearly 250 systems operating at Menwith Hill and the existence of multiple databases located on British soil so far unknown.
Following their multiple actions, they multiply the trials and periods of incarceration. And Ann Lee was sentenced in 2007 to two months in prison for having cut a security gate. Helen John, aged 60 years, was convicted 34 times and served 18 months in prison.
Intercept stations [edit]
A radome at Menwith Hill
Bunker monitoring Silvermine (South Africa)Here are the lists of known or suspected participation in Echelon stations:
Main stations [edit]
Station
(Designation)
Location
Operator
Other information
Yakima Research Station (YRS) (USD-110) 6
Yakima, Washington
NSA1
Detachment 4, 544th Intelligence Group
first station ECHELON
Closing Announced 20137
Sugar Grove
West Virginia
Naval Security Group Activity Sugar Grove
Detachment 3, 544th Intelligence Group
Slated for closure in 20168
Sabana Seca
Puerto Rico
Naval Security Group Activity Sabana Seca
Detachment 2, 544th Intelligence Group
Leitrim (CAF-97) 1
Ontario, Canada
CSEC
RAF Menwith Hill (USD-1000) 6
near Harrogate, Yorkshire, UK
NSA1
GCHQ Bude
(Formerly CSO Morwenstow)
Cornwall, UK
Composite Signals Organisation (civil branch of GCHQ)
This is the largest interception station Echelon1
Guam
Pacific Ocean
U.S. Navy1
Australian Defence Satellite Communications Station (ADSCS)
Kojarena near Geraldton, Western Australia
DSD
Waihopai (NZC-3336)
New Zealand
GCSB
operating since the end of 19919
Other stations [edit]
Alert, Ellesmere Island, Nunavut, Canada
Ayios Nikolaos, Cyprus (for the UK)
Bremerhaven, Germany (UK)
Buckley Air Force Base, Colorado, United States
Diego Garcia, Indian Ocean (UK)
Digby, Lincolnshire, United Kingdom
Elmendorf, Alaska (for United States)
Feltwell, Norfolk, UK
Fort Gordon, Georgia, United States: NSA / CSS Georgia (formerly the Gordon Regional SIGINT Operations Center or Gordon RSOC)
Gander, Newfoundland and Labrador, Canada
Gibraltar (United Kingdom)
Ascension Island, Atlantic Ocean (administered by the Composite Signals Organisation (CSO), the civil branch GCHQ1)
Karamursel, Turkey (for the U.S.)
Kunia, Hawaii: NSA / CSS Hawaii (formerly Kunia RSOC) administered by the Naval Security Group U.S. English1
Malta (in the UK)
Masset, British Columbia, Canada
Fort Meade, Maryland, United States (head of the NSA) 1
Medina Annex, Lackland Air Force Base, near San Antonio, Texas, USA: Texas Cryptology Center (formerly Medina RSOC) led by the intelligence service of the U.S. Air Force1)
Misawa, Japan (controlled by the Air Intelligence Agency, the intelligence service of the U.S. Air Force1)
Osan, South Korea (for United States)
Pine Gap, near Alice Springs, Australia
Shoal Bay near Darwin, Northern Territory, Australia (according to Australian sources, Shoal Bay is not actually part of the ECHELON network, since the raw information data are not transmitted in the United States and other members UKUSA9 Treaty.)
Rota, Spain (for the U.S.)
Silvermine near Cape Town, South Africa (for the U.S.)
Tangimoana, New Zealand
West Cape, Western Australia, Australia (United States)
Old stations [edit]
Bad Aibling, Germany (the United States): Closed in 2004 [ref. needed] (directly managed by the NSA and civilians until 19951)
Chicksands, Bedfordshire, United Kingdom: removal of USAF personnel in 1997
Clark, Philippines (for the U.S.): Closed in 1997
Behshahr and Kapkan (ELINT CIA stations called tacksman I and II), Iran (to the U.S.): removed in 1979 after the Iranian Revolution
Little Sai Wan, Hong Kong (for the UK): Closed in 1982
Teufelsberg, West Berlin, Germany (for the U.S.): Closed in 1991
See also [edit]
On other Wikimedia projects:
Echelon on Wikimedia Commons
References [edit]
(En) Duncan Campbell, "They've got it taped," New Statesman, 12 August 1988, p. 10-12 [Full text]
(En) Nicky Hager, Secret Power: New Zealand's Role in the International Spy Network, Nelson, New Zealand, Craig Potton Publishing, 1996 (ISBN 0-9088-0235-8 and 978-0-908802-35-7) [ read online]
(En) Jeffrey Richelson, "Desperately seeking signals," The Bulletin of the Atomic Scientists, vol. 56, No. 2, March / April 2000, p. 47-51 [Full text]
Arthur Paecht Information Report on monitoring systems and electronic interception could jeopardize national security. National Assembly (France), 11 October 2000. 89 pages.
Gerhard Schmid, Report on the existence of a global system for intercepting private and commercial communications, ECHELON interception system. European Parliament, 11 July 2001. 202 pages. A5-02-64/2001 report
(En) Development of monitoring technology and risk of abuse of economic information panel Science and Technology Options Assessment (STOA) of the European Parliament in December 1999 volume 1/5: Peggy Becker, Analysis and Presentation [read online]
Volume 2/5: Duncan Campbell, The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence Purposes of intercepted broadband multi-language leased or common carrier systems, and Its applicability to COMINT targetting and selection, Including speech recognition [ read online] or Interception Capabilities 2000 (expanded edition translated into French: Duncan Campbell, Global Electronic Surveillance, Paris, Editions Allia, 2001 (reprint 2005) [read online])
Volume 3/5: Franck Leprevost, Encryption and cryptosystems in electronic monitoring: a survey of the technology assessment issues [read online]
Volume 4/5: Chris Elliot, The Legality of interception of electronic communications: a concise survey of the principal legal issues and instruments under international, european and national law [read online]
Volume 5/5: Nikos Bogolikos, The perception of Economic Risks Arising from the potential vulnerability of electronic business media to interception] [read online]
Franck Leprevost & Bertrand Warusfel, Echelon: origins and prospects for transnational debate, French Directory International Relations, Volume 2, 2001, Ed Bruylant, p. 865-888.
S. Lizin, Ch Van Parys. Report on the possible existence of a network of interception of communications, called "Echelon". Senate and House of Representatives of Belgium, February 25, 2002. 70 pages.
Filmography [edit]
Echelon, the secret power, documentary-Brzoza David Korn (co-France 2 - Kuiv Productions) where several former members of the network show.
Conspiracy fiction film Greg Marcks (2010): Echelon is scheduled for conspiration10
Related Articles [edit]
Frenchelon (France)
Swechelon (Sweden)
Onyx (Switzerland)
High frequency active auroral research program (HAARP)
TEMPEST display system computer screens (and a priori any system emitting any wave) distance.
Information Leakage
Perfect Citizen
External links [edit]
Smile you will spy a book survey Cherche Midi
Site on the ECHELON network
Temporary Committee of the European parliament on the Echelon network (18 May 2001) [PDF]
Information of the French National Assembly report on Echelon (11 October 2000) network
Final Report of the investigation of the European Parliament on the Echelon network (11 July 2001) [PDF]
Video documentary on Echelon
(In) "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired, April 2012.
Notes and references [edit]
1. ↑ a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r and s Duncan Campbell, Global monitoring electronics, p. 17-24 specifically the UKUSA.
2. ↑ Duncan Campbell, Somebody's listening [archive], The New Statesman, 12 August 1988, pages 10-12
3. ↑ (en) Series of articles in the New York Times [archive]
4. ↑ (en) The Echelon network to rescue Maddie, Alain Charret, French Centre for Research on Intelligence [archive]
↑ 5., B and c Duncan Campbell, BT Condemned for listing cables to U.S. SIGINT station [archive], September 4, 1997
6. ↑ a, b and c Nicky Hager, Secret Power, p. 149
↑ Troianello 7,. (In) Craig "NSA to close Yakima Training Center facility," Yakima Herald-Republic, April 4, 2013 [Full text [archive] (accessed April 7, 2013)]
8. ↑ Nearly 200 West Virginia Navy Sailors and Their Families to Relocate [archive] WHSV.com, September 27, 2012
9. ↑ a and b Duncan Campbell, Global Monitoring electronic, p. 77
10. ↑ http://www.allocine.fr/film/fichefilm_gen_cfilm=143031.html [archive]
IT Security Portal
Portal cryptology
Intelligence Portal
Portal telecommunications
Portal U.S.
Categories: Information SIGINTComputer SecurityConspiracy Theory
| [+]
0 件のコメント:
コメントを投稿