CIA admits faking Osama bin Laden 9/11 confession video

Buddy

The Living Force
The latest video from brasschecktv for anyone who has yet to see it.


Max Keiser talking to Alex Jones.

[quote author=http://www.brasschecktv.com/page/869.html]

Amazing.

Not that the CIA did it. They've done much, much worse.

Not that the tape was fake. Anyone who actually looked at the video knew it couldn't be real.

What's amazing is that the reality of it all was actually admitted by the mainstream mass media - even if it was hidden deep in the back pages [of the Washington Post].

Even more amazing is that the CIA faking the Osama Bin Laden confession is the least disturbing part of this video.
[/quote]
 
I am having trouble finding the original Washington Post article. Is it anywhere online?

I am only finding articles that mention it.
Like
_http://undebunked.wordpress.com/2010/05/26/ex-c-i-a-officials-admit-to-making-fake-bin-laden-tapes/
 
Thanks Bud,

Terrible, fake video responsible for mass hypnotizing of US citizens in order to start 2 bloody wars. Washington post admitting fake video but saying: it was patriotic duty to put fake Osama on TV in order to start war against terrorism, Google spying all around the world and intercepting messages, funded by NSA, hey we do not need echelon if we have Google :headbash:, Jeez, seems like I'm in middle of poor ecranisation of Orvel's 1984.

But talking a bit more about legal espionage in e-world and phone system, Echelon is still the most gigantic Big Brother in 3D and listening about 98% of all virtual communication on earth. Here's a bit more about Echelon:

Echelon (signals intelligence)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For other uses, see Echelon (disambiguation).
A radome at RAF Menwith Hill, a site with satellite downlink capabilities believed to be used by ECHELON.
RAF Menwith Hill
Misawa Air Base Security Operations Center (MSOC)

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UK–USA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, known as AUSCANZUKUS).[1][2] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[3]

ECHELON was reportedly created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s, but since the end of the Cold War it is believed to search also for hints of terrorist plots, drug dealers' plans, and political and diplomatic intelligence.[citation needed]

The system has been reported in a number of public sources.[4] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[3]

In its report, the European Parliament states that the term Turtle is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg The UKUSA intelligence community is assessed by the European Parliament to include the signals intelligence agencies of each of the member states - the National Security Agency of the United States, the Government Communications Headquarters of Britain, the Communications Security Establishment of Canada, the Defence Signals Directorate of Australia, and the Government Communications Security Bureau of New Zealand. The EP report concludes that it seems likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]
[edit] Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s high frequency ("short wave") radio was widely used for military and diplomatic communication,[6] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: "If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites."[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics. As of 2006[update], 99% of the world's long-distance voice and data traffic was carried over optical-fiber.[7] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years in Central Europe to an amount between 0.4 and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[8] Thus the majority of communications cannot be intercepted by earth stations, but only by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past much Internet traffic was routed through the U.S. and the UK, but this has changed; for example 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt in 2000.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, or local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-USA systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[9]
[edit] Controversy

Intelligence monitoring of people in the area covered by the AUSCANZUKUS security agreement has caused concern. Some critics claim the system is being used not only to search for terrorist plots, drug dealers' plans, and political and diplomatic intelligence but also for large-scale commercial theft, international economic espionage and invasion of privacy. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[11][12] and the speech technology developed by the Belgian firm Lernout & Hauspie.[13] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[14][15]

In 2001 the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy.[5]

Bamford provides an alternate view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although does elaborate on how intercepted communications are used as part of an all-source intelligence process.
[edit] Hardware

According to its website the USA's National Security Agency is "a high technology organization... on the frontiers of communications and data processing". In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites are said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defense radar, communications satellites and ground based microwave communications.[16]
[edit] Name

The European Parliament's Temporary Committee on the ECHELON Interception System stated: "It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail."[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Margaret Newsham claims that she worked on the configuration and installation of some of the software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, USA and in Menwith Hill, England, UK.[17] At that time, according to Newsham, the code name ECHELON was NSA's term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX would intercept communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[18]
[edit] Ground stations

In 2001 the European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to or participating in the ECHELON network. These include:
[edit] Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have a role in intercepting transmissions from telecommunications satellites:

* Hong Kong (since closed)
* Australian Defence Satellite Communications Station (Geraldton, Western Australia)
* Menwith Hill (Yorkshire, UK) Map
* Misawa Air Base (Japan)
* GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, UK) Map
* Pine Gap (Northern Territory, Australia - close to Alice Springs) Map
* Sugar Grove (West Virginia, US) Map
* Yakima Training Center (Washington, US) Map
* GCSB Waihopai (New Zealand)

[edit] Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles "cannot be clearly established":

* Ayios Nikolaos (Cyprus - UK)
* Bad Aibling Station (Bad Aibling, Germany - US)
o - moved to Griesheim in 2004[19]
* Buckley Air Force Base (Aurora, Colorado, US)
* Fort Gordon (Georgia, US)
* Gander (Newfoundland & Labrador, Canada)
* Guam (Pacific Ocean, US)
* Kunia (Hawaii, US)
* Leitrim (south of Ottawa, Ontario, Canada)
* Lackland Air Force Base, Medina Annex (San Antonio, Texas, US)
from: http://en.wikipedia.org/wiki/Echelon_%28signals_intelligence%29

more:

ECHELON is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses. Every word of every message in the frequencies and channels selected at a station is automatically searched. The processors in the network are known as the ECHELON Dictionaries. ECHELON connects all these computers and allows the individual stations to function as distributed elements an integrated system. An ECHELON station's Dictionary contains not only its parent agency's chosen keywords, but also lists for each of the other four agencies in the UKUSA system [NSA, GCHQ, DSD, GCSB and CSE]

from: http://www.fas.org/irp/program/process/echelon.htm

or:

The system is called ECHELON, and had been rumored to be in development since 1947, the result of the UKUSA treaty signed by the governments of the United States, the United Kingdom, Canada, Australia and New Zealand.

The purpose of the UKUSA agreement was to create a single vast global intelligence organization sharing common goals and a common agenda, spying on the world and sharing the data. The uniformity of operation is such that NSA operatives from Fort Meade could work from Menwith Hill to intercept local communications without either nation having to formally approve or disclose the interception.
What is ECHELON used for?

In the days of the cold war, ECHELON's primary purpose was to keep an eye on the U.S.S.R. In the wake of the fall of the U.S.S.R. ECHELON justifies it's continued multi-billion dollar expense with the claim that it is being used to fight "terrorism", the catch-all phrase used to justify any and all abuses of civil rights.

With the exposure of the APEC scandal, however, ECHELON's capabilities have come under renewed scrutiny and criticism by many nations. Although not directly implicated in the bugging of the Asia Pacific Economic Conference in Seattle, the use of so many U.S. Intelligence agencies to bug the conference for the purpose of providing commercial secrets to DNC donors raised the very real possability that ECHELON's all-hearing ears were prying corporate secrets loose for the advantage of the favored few.

Given that real terrorists and drug runners would always use illegal cryptographic methods anyway, the USA led attempt to ban strong crypto to the general populace seemed geared towards keeping corporate secrets readable to ECHELON, rather than any real attempt at crime prevention.
The cover blows off!

Even close allies do not like it when they are being spied on. Especially if the objective is not law enforcement but corporate shenanigans to make rich politicians just that much richer. So, the Civil Liberties Committee of the European Parliament looked into ECHELON, and officially confirmed it's existence and purpose.

Here is the article that ran in the London Telegraph.
Tuesday 16 December 1997

Issue 936


Spies like US

A European Commission report warns that the United States has developed
an extensive network spying on European citizens and we should all be
worried. Simon Davies reports

Cooking up a charter for snooping

A GLOBAL electronic spy network that can eavesdrop on every telephone,
email and telex communication around the world will be officially
acknowledged for the first time in a European Commission report to be
delivered this week.

The report - Assessing the Technologies of Political Control - was
commissioned last year by the Civil Liberties Committee of the European
Parliament. It contains details of a network of American-controlled
intelligence stations on British soil and around the world, that
"routinely and indiscriminately" monitor countless phone, fax and email
messages.

It states: "Within Europe all email telephone and fax communications
are routinely intercepted by the United States National Security Agency
transfering all target information from the European mainland via the
strategic hub of London then by satellite to Fort Meade in Maryland via
the crucial hub at Menwith Hill in the North York moors in the UK."

The report confirms for the first time the existence of the secretive
ECHELON system.

Until now, evidence of such astounding technology has been patchy and
anecdotal. But the report - to be discussed on Thursday by the
committee of the office of Science and Technology Assessment in
Luxembourg - confirms that the citizens of Britain and other European
states are subject to an intensity of surveillance far in excess of
that imagined by most parliaments. Its findings are certain to excite
the concern of MEPs.

"The ECHELON system forms part of the UKUSA system (Cooking up a
charter for snooping) but unlike many of the electronic spy systems
developed during the Cold War, ECHELON is designed primarily for
non-military targets: governments, organizations and businesses in
virtually every country.

"The ECHELON system works by indiscriminately intercepting very large
quantities of communications and then siphoning out what is valuable
using artificial intelligence aids like MEMEX to find key words".

According to the report, ECHELON uses a number of national dictionaries
containing key words of interest to each country.

For more than a decade, former agents of US, British, Canadian and New
Zealand national security agencies have claimed that the monitoring of
electronic communications has become endemic throughout the world.
Rumours have circulated that new technologies have been developed which
have the capability to search most of the world's telex, fax and email
networks for "key words". Phone calls, they claim, can be automatically
analysed for key words.

Former signals intelligence operatives have claimed that spy bases
controlled by America have the ability to search nearly all data
communications for key words. They claim that ECHELON automatically
analyses most email messaging for "precursor" data which assists
intelligence agencies to determine targets. According to former
Canadian Security Establishment agent Mike Frost, a voice recognition
system called Oratory has been used for some years to intercept
diplomatic calls.

The driving force behind the report is Glyn Ford, Labour MEP for
Greater Manchester East. He believes that the report is crucial to the
future of civil liberties in Europe.

"In the civil liberties committee we spend a great deal of time
debating issues such as free movement, immigration and drugs.
Technology always sits at the centre of these discussions. There are
times in history when technology helps democratise, and times when it
helps centralise. This is a time of centralisation. The justice and
home affairs pillar of Europe has become more powerful without a
corresponding strengthening of civil liberties."

The report recommends a variety of measures for dealing with the
increasing power of the technologies of surveillance being used at
Menwith Hill and other centres. It bluntly advises: "The European
Parliament should reject proposals from the United States for making
private messages via the global communications network (Internet)
accessible to US intelligence agencies."

The report also urges a fundamental review of the involvement of the
American NSA (National Security Agency) in Europe, suggesting that
their activities be either scaled down, or become more open and
accountable.

Such concerns have been privately expressed by governments and MEPs
since the Cold War, but surveillance has continued to expand. US
intelligence activity in Britain has enjoyed a steady growth throughout
the past two decades. The principal motivation for this rush of
development is the US interest in commercial espionage. In the Fifties,
during the development of the "special relationship" between America
and Britain, one US institution was singled out for special attention.

The NSA, the world's biggest and most powerful signals intelligence
organisation, received approval to set up a network of spy stations
throughout Britain. Their role was to provide military, diplomatic and
economic intelligence by intercepting communications from throughout
the Northern Hemisphere.

The NSA is one of the shadowiest of the US intelligence agencies. Until
a few years ago, it existence was a secret and its charter and any
mention of its duties are still classified. However, it does have a Web
site (www.nsa.gov:8080) in which it describes itself as being
responsible for the signals intelligence and communications security
activities of the US government.

One of its bases, Menwith Hill, was to become the biggest spy station
in the world. Its ears - known as radomes - are capable of listening in
to vast chunks of the communications spectrum throughout Europe and the
old Soviet Union.

In its first decade the base sucked data from cables and microwave
links running through a nearby Post Office tower, but the
communications revolutions of the Seventies and Eighties gave the base
a capability that even its architects could scarcely have been able to
imagine. With the creation of Intelsat and digital telecommunications,
Menwith and other stations developed the capability to eavesdrop on an
extensive scale on fax, telex and voice messages. Then, with the
development of the Internet, electronic mail and electronic commerce,
the listening posts were able to increase their monitoring capability
to eavesdrop on an unprecedented spectrum of personal and business
communications.

This activity has been all but ignored by the UK Parliament. When
Labour MPs raised questions about the activities of the NSA, the
Government invoked secrecy rules. It has been the same for 40 years.

Glyn Ford hopes that his report may be the first step in a long road to
more openness. "Some democratically elected body should surely have a
right to know at some level. At the moment that's nowhere".

Copyright Telegraph Group Limited 1997. Terms & Conditions of
reading.

Information about Telegraph Group Limited and Electronic Telegraph.

"Electronic Telegraph" and "The Daily Telegraph" are trademarks of
Telegraph Group Limited. These marks may not be copied or used without
permission. Information for webmasters linking to Electronic Telegraph.
FROM COVERT ACTION QUARTERLY
EXPOSING THE GLOBAL SURVEILLANCE SYSTEM
by Nicky Hager

IN THE LATE 1980S, IN A DECISION IT PROBABLY REGRETS, THE US PROMPTED
NEW ZEALAND TO JOIN A NEW AND HIGHLY SECRET GLOBAL INTELLIGENCE SYSTEM.
HAGER'S INVESTIGATION INTO IT AND HIS DISCOVERY OF THE ECHELON
DICTIONARY HAS REVEALED ONE OF THE WORLD'S BIGGEST, MOST CLOSELY HELD
INTELLIGENCE PROJECTS. THE SYSTEM ALLOWS SPY AGENCIES TO MONITOR MOST
OF THE WORLD'S TELEPHONE, E-MAIL, AND TELEX COMMUNICATIONS.

For 40 years, New Zealand's largest intelligence agency, the Government
Communications Security Bureau (GCSB) the nation's equivalent of the
US National Security Agency (NSA) had been helping its Western
allies to spy on countries throughout the Pacific region, without the
knowledge of the New Zealand public or many of its highest elected
officials. What the NSA did not know is that by the late 1980s, various
intelligence staff had decided these activities had been too secret for
too long, and were providing me with interviews and documents exposing
New Zealand's intelligence activities. Eventually, more than 50 people
who work or have worked in intelligence and related fields agreed to be
interviewed.

The activities they described made it possible to document, from the
South Pacific, some alliance-wide systems and projects which have been
kept secret elsewhere. Of these, by far the most important is ECHELON.

Designed and coordinated by NSA, the ECHELON system is used to
intercept ordinary e-mail, fax, telex, and telephone communications
carried over the world's telecommunications networks. Unlike many of
the electronic spy systems developed during the Cold War, ECHELON is
designed primarily for non-military targets: governments,
organizations, businesses, and individuals in virtually every country.
It potentially affects every person communicating between (and
sometimes within) countries anywhere in the world.

It is, of course, not a new idea that intelligence organizations tap
into e-mail and other public telecommunications networks. What was new
in the material leaked by the New Zealand intelligence staff was
precise information on where the spying is done, how the system works,
its capabilities and shortcomings, and many details such as the
codenames.

The ECHELON system is not designed to eavesdrop on a particular
individual's e-mail or fax link. Rather, the system works by
indiscriminately intercepting very large quantities of communications
and using computers to identify and extract messages of interest from
the mass of unwanted ones. A chain of secret interception facilities
has been established around the world to tap into all the major
components of the international telecommunications networks. Some
monitor communications satellites, others land-based communications
networks, and others radio communications. ECHELON links together all
these facilities, providing the US and its allies with the ability to
intercept a large proportion of the communications on the planet.

The computers at each station in the ECHELON network automatically
search through the millions of messages intercepted for ones containing
pre-programmed keywords. Keywords include all the names, localities,
subjects, and so on that might be mentioned. Every word of every
message intercepted at each station gets automatically searched
whether or not a specific telephone number or e-mail address is on the
list.

The thousands of simultaneous messages are read in "real time" as they
pour into the station, hour after hour, day after day, as the computer
finds intelligence needles in telecommunications haystacks.

SOMEONE IS LISTENING The computers in stations around the globe are
known, within the network, as the ECHELON Dictionaries. Computers that
can automatically search through traffic for keywords have existed
since at least the 1970s, but the ECHELON system was designed by NSA to
interconnect all these computers and allow the stations to function as
components of an integrated whole. The NSA and GCSB are bound together
under the five-nation UKUSA signals intelligence agreement. The other
three partners all with equally obscure names are the Government
Communications Headquarters (GCHQ) in Britain, the Communications
Security Establishment (CSE) in Canada, and the Defense Signals
Directorate (DSD) in Australia.

The alliance, which grew from cooperative efforts during World War II
to intercept radio transmissions, was formalized into the UKUSA
agreement in 1948 and aimed primarily against the USSR. The five UKUSA
agencies are today the largest intelligence organizations in their
respective countries. With much of the world's business occurring by
fax, e-mail, and phone, spying on these communications receives the
bulk of intelligence resources. For decades before the introduction of
the ECHELON system, the UKUSA allies did intelligence collection
operations for each other, but each agency usually processed and
analyzed the intercept from its own stations.

Under ECHELON, a particular station's Dictionary computer contains not
only its parent agency's chosen keywords, but also has lists entered in
for other agencies. In New Zealand's satellite interception station at
Waihopai (in the South Island), for example, the computer has separate
search lists for the NSA, GCHQ, DSD, and CSE in addition to its own.
Whenever the Dictionary encounters a message containing one of the
agencies' keywords, it automatically picks it and sends it directly to
the headquarters of the agency concerned. No one in New Zealand
screens, or even sees, the intelligence collected by the New Zealand
station for the foreign agencies. Thus, the stations of the junior
UKUSA allies function for the NSA no differently than if they were
overtly NSA-run bases located on their soil.

The first component of the ECHELON network are stations specifically
targeted on the international telecommunications satellites (Intelsats)
used by the telephone companies of most countries. A ring of Intelsats
is positioned around the world, stationary above the equator, each
serving as a relay station for tens of thousands of simultaneous phone
calls, fax, and e-mail. Five UKUSA stations have been established to
intercept the communications carried by the Intelsats.

The British GCHQ station is located at the top of high cliffs above the
sea at Morwenstow in Cornwall. Satellite dishes beside sprawling
operations buildings point toward Intelsats above the Atlantic, Europe,
and, inclined almost to the horizon, the Indian Ocean. An NSA station
at Sugar Grove, located 250 kilometers southwest of Washington, DC, in
the mountains of West Virginia, covers Atlantic Intelsats transmitting
down toward North and South America. Another NSA station is in
Washington State, 200 kilometers southwest of Seattle, inside the
Army's Yakima Firing Center. Its satellite dishes point out toward the
Pacific Intelsats and to the east. *1

The job of intercepting Pacific Intelsat communications that cannot be
intercepted at Yakima went to New Zealand and Australia. Their South
Pacific location helps to ensure global interception. New Zealand
provides the station at Waihopai and Australia supplies the Geraldton
station in West Australia (which targets both Pacific and Indian Ocean
Intelsats). *2

Each of the five stations' Dictionary computers has a codename to
distinguish it from others in the network. The Yakima station, for
instance, located in desert country between the Saddle Mountains and
Rattlesnake Hills, has the COWBOY Dictionary, while the Waihopai
station has the FLINTLOCK Dictionary. These codenames are recorded at
the beginning of every intercepted message, before it is transmitted
around the ECHELON network, allowing analysts to recognize at which
station the interception occurred.

New Zealand intelligence staff has been closely involved with the NSA's
Yakima station since 1981, when NSA pushed the GCSB to contribute to a
project targeting Japanese embassy communications. Since then, all five
UKUSA agencies have been responsible for monitoring diplomatic cables
from all Japanese posts within the same segments of the globe they are
assigned for general UKUSA monitoring.3 Until New Zealand's integration
into ECHELON with the opening of the Waihopai station in 1989, its
share of the Japanese communications was intercepted at Yakima and sent
unprocessed to the GCSB headquarters in Wellington for decryption,
translation, and writing into UKUSA-format intelligence reports (the
NSA provides the codebreaking programs).

"COMMUNICATION" THROUGH SATELLITES The next component of the ECHELON
system intercepts a range of satellite communications not carried by
Intelsat.In addition to the UKUSA stations targeting Intelsat
satellites, there are another five or more stations homing in on
Russian and other regional communications satellites. These stations
are Menwith Hill in northern England; Shoal Bay, outside Darwin in
northern Australia (which targets Indonesian satellites); Leitrim, just
south of Ottawa in Canada (which appears to intercept Latin American
satellites); Bad Aibling in Germany; and Misawa in northern Japan.

A group of facilities that tap directly into land-based
telecommunications systems is the final element of the ECHELON system.
Besides satellite and radio, the other main method of transmitting
large quantities of public, business, and government communications is
a combination of water cables under the oceans and microwave networks
over land. Heavy cables, laid across seabeds between countries, account
for much of the world's international communications. After they come
out of the water and join land-based microwave networks they are very
vulnerable to interception. The microwave networks are made up of
chains of microwave towers relaying messages from hilltop to hilltop
(always in line of sight) across the countryside. These networks shunt
large quantities of communications across a country. Interception of
them gives access to international undersea communications (once they
surface) and to international communication trunk lines across
continents. They are also an obvious target for large-scale
interception of domestic communications.

Because the facilities required to intercept radio and satellite
communications use large aerials and dishes that are difficult to hide
for too long, that network is reasonably well documented. But all that
is required to intercept land-based communication networks is a
building situated along the microwave route or a hidden cable running
underground from the legitimate network into some anonymous building,
possibly far removed. Although it sounds technically very difficult,
microwave interception from space by United States spy satellites also
occurs.4 The worldwide network of facilities to intercept these
communications is largely undocumented, and because New Zealand's GCSB
does not participate in this type of interception, my inside sources
could not help either.

NO ONE IS SAFE FROM A MICROWAVE A 1994 expos of the Canadian UKUSA
agency, Spyworld, co-authored by one of its former staff, Mike Frost,
gave the first insights into how a lot of foreign microwave
interception is done (see p. 18). It described UKUSA "embassy
collection" operations, where sophisticated receivers and processors
are secretly transported to their countries' overseas embassies in
diplomatic bags and used to monitor various communications in foreign
capitals. *5

Since most countries' microwave networks converge on the capital city,
embassy buildings can be an ideal site. Protected by diplomatic
privilege, they allow interception in the heart of the target country.
*6 The Canadian embassy collection was requested by the NSA to fill
gaps in the American and British embassy collection operations, which
were still occurring in many capitals around the world when Frost left
the CSE in 1990. Separate sources in Australia have revealed that the
DSD also engages in embassy collection. *7 On the territory of UKUSA
nations, the interception of land-based telecommunications appears to
be done at special secret intelligence facilities. The US, UK, and
Canada are geographically well placed to intercept the large amounts of
the world's communications that cross their territories.

The only public reference to the Dictionary system anywhere in the
world was in relation to one of these facilities, run by the GCHQ in
central London. In 1991, a former British GCHQ official spoke
anonymously to Granada Television's World in Action about the agency's
abuses of power. He told the program about an anonymous red brick
building at 8 Palmer Street where GCHQ secretly intercepts every telex
which passes into, out of, or through London, feeding them into
powerful computers with a program known as "Dictionary." The operation,
he explained, is staffed by carefully vetted British Telecom people:
"It's nothing to do with national security. It's because it's not legal
to take every single telex. And they take everything: the embassies,
all the business deals, even the birthday greetings, they take
everything. They feed it into the Dictionary." *8 What the documentary
did not reveal is that Dictionary is not just a British system; it is
UKUSA-wide.

Similarly, British researcher Duncan Campbell has described how the US
Menwith Hill station in Britain taps directly into the British Telecom
microwave network, which has actually been designed with several major
microwave links converging on an isolated tower connected underground
into the station.9

The NSA Menwith Hill station, with 22 satellite terminals and more than
4.9 acres of buildings, is undoubtedly the largest and most powerful in
the UKUSA network. Located in northern England, several thousand
kilometers from the Persian Gulf, it was awarded the NSA's "Station of
the Year" prize for 1991 after its role in the Gulf War. Menwith Hill
assists in the interception of microwave communications in another way
as well, by serving as a ground station for US electronic spy
satellites. These intercept microwave trunk lines and short range
communications such as military radios and walkie talkies. Other
ground stations where the satellites' information is fed into the
global network are Pine Gap, run by the CIA near Alice Springs in
central Australia and the Bad Aibling station in Germany. *10 Among
them, the various stations and operations making up the ECHELON network
tap into all the main components of the world's telecommunications
networks. All of them, including a separate network of stations that
intercepts long distance radio communications, have their own
Dictionary computers connected into ECHELON.

In the early 1990s, opponents of the Menwith Hill station obtained
large quantities of internal documents from the facility. Among the
papers was a reference to an NSA computer system called Platform. The
integration of all the UKUSA station computers into ECHELON probably
occurred with the introduction of this system in the early 1980s. James
Bamford wrote at that time about a new worldwide NSA computer network
codenamed Platform "which will tie together 52 separate computer
systems used throughout the world. Focal point, or `host environment,'
for the massive network will be the NSA headquarters at Fort Meade.
Among those included in Platform will be the British SIGINT
organization, GCHQ." *11

LOOKING IN THE DICTIONARY The Dictionary computers are connected via
highly encrypted UKUSA communications that link back to computer data
bases in the five agency headquarters. This is where all the
intercepted messages selected by the Dictionaries end up. Each morning
the specially "indoctrinated" signals intelligence analysts in
Washington, Ottawa,Cheltenham, Canberra, and Wellington log on at their
computer terminals and enter the Dictionary system. After keying in
their security passwords, they reach a directory that lists the
different categories of intercept available in the data bases, each
with a four-digit code. For instance, 1911 might be Japanese diplomatic
cables from Latin America (handled by the Canadian CSE), 3848 might be
political communications from and about Nigeria, and 8182 might be any
messages about distribution of encryption technology.

They select their subject category, get a "search result" showing how
many messages have been caught in the ECHELON net on that subject, and
then the day's work begins. Analysts scroll through screen after
screen of intercepted faxes, e-mail messages, etc. and, whenever a
message appears worth reporting on, they select it from the rest to
work on. If it is not in English, it is translated and then written
into the standard format of intelligence reports produced anywhere
within the UKUSA network either in entirety as a "report," or as a
summary or "gist."

INFORMATION CONTROL A highly organized system has been developed to
control what is being searched for by each station and who can have
access to it. This is at the heart of ECHELON operations and works as
follows.

The individual station's Dictionary computers do not simply have a long
list of keywords to search for. And they do not send all the
information into some huge database that participating agencies can dip
into as they wish. It is much more controlled.

The search lists are organized into the same categories, referred to by
the four digit numbers. Each agency decides its own categories
according to its responsibilities for producing intelligence for the
network. For GCSB, this means South Pacific governments, Japanese
diplomatic, Russian Antarctic activities, and so on.

The agency then works out about 10 to 50 keywords for selection in each
category. The keywords include such things as names of people, ships,
organizations, country names, and subject names. They also include the
known telex and fax numbers and Internet addresses of any individuals,
businesses, organizations, and government offices that are targets.
These are generally written as part of the message text and so are
easily recognized by the Dictionary computers.

The agencies also specify combinations of keywords to help sift out
communications of interest. For example, they might search for
diplomatic cables containing both the words "Santiago" and "aid," or
cables containing the word "Santiago" but not "consul" (to avoid the
masses of routine consular communications). It is these sets of words
and numbers (and combinations), under a particular category, that get
placed in the Dictionary computers. (Staff in the five agencies called
Dictionary Managers enter and update the keyword search lists for each
agency.)

The whole system, devised by the NSA, has been adopted completely by
the other agencies. The Dictionary computers search through all the
incoming messages and, whenever they encounter one with any of the
agencies' keywords, they select it. At the same time, the computer
automatically notes technical details such as the time and place of
interception on the piece of intercept so that analysts reading it, in
whichever agency it is going to, know where it came from, and what it
is. Finally, the computer writes the four-digit code (for the category
with the keywords in that message) at the bottom of the message's
text. This is important. It means that when all the intercepted
messages end up together in the database at one of the agency
headquarters, the messages on a particular subject can be located
again. Later, when the analyst using the Dictionary system selects the
four- digit code for the category he or she wants, the computer simply
searches through all the messages in the database for the ones which
have been tagged with that number.

This system is very effective for controlling which agencies can get
what from the global network because each agency only gets the
intelligence out of the ECHELON system from its own numbers. It does
not have any access to the raw intelligence coming out of the system to
the other agencies. For example, although most of the GCSB's
intelligence production is primarily to serve the UKUSA alliance, New
Zealand does not have access to the whole ECHELON network. The access
it does have is strictly controlled. A New Zealand intelligence officer
explained: "The agencies can all apply for numbers on each other's
Dictionaries. The hardest to deal with are the Americans. ... [There
are] more hoops to jump through, unless it is in their interest, in
which case they'll do it for you."

There is only one agency which, by virtue of its size and role within
the alliance, will have access to the full potential of the ECHELON
system the agency that set it up. What is the system used for?
Anyone listening to official "discussion" of intelligence could be
forgiven for thinking that, since the end of the Cold War, the key
targets of the massive UKUSA intelligence machine are terrorism,
weapons proliferation, and economic intelligence. The idea that
economic intelligence has become very important, in particular, has
been carefully cultivated by intelligence agencies intent on preserving
their post-Cold War budgets. It has become an article of faith in much
discussion of intelligence. However, I have found no evidence that
these are now the primary concerns of organizations such as NSA.

QUICKER INTELLIGENCE,SAME MISSION A different story emerges after
examining very detailed information I have been given about the
intelligence New Zealand collects for the UKUSA allies and detailed
descriptions of what is in the yards-deep intelligence reports New
Zealand receives from its four allies each week. There is quite a lot
of intelligence collected about potential terrorists, and there is
quite a lot of economic intelligence, notably intensive monitoring of
all the countries participating in GATT negotiations. But by far, the
main priorities of the intelligence alliance continue to be political
and military intelligence to assist the larger allies to pursue their
interests around the world. Anyone and anything the particular
governments are concerned about can become a target.

With capabilities so secret and so powerful, almost anything goes. For
example, in June 1992, a group of current "highly placed intelligence
operatives" from the British GCHQ spoke to the London Observer: "We
feel we can no longer remain silent regarding that which we regard to
be gross malpractice and negligence within the establishment in which
we operate." They gave as examples GCHQ interception of three
charitable organizations, including Amnesty International and Christian
Aid. As the Observer reported: "At any time GCHQ is able to home in on
their communications for a routine target request," the GCHQ source
said. In the case of phone taps the procedure is known as Mantis. With
telexes it is called Mayfly. By keying in a code relating to Third
World aid, the source was able to demonstrate telex "fixes" on the
three organizations. "It is then possible to key in a trigger word
which enables us to home in on the telex communications whenever that
word appears," he said. "And we can read a pre-determined number of
characters either side of the keyword."12 Without actually naming it,
this was a fairly precise description of how the ECHELON Dictionary
system works. Again, what was not revealed in the publicity was that
this is a UKUSA-wide system. The design of ECHELON means that the
interception of these organizations could have occurred anywhere in the
network, at any station where the GCHQ had requested that the
four-digit code covering Third World aid be placed.

Note that these GCHQ officers mentioned that the system was being used
for telephone calls. In New Zealand, ECHELON is used only to intercept
written communications: fax, e-mail, and telex. The reason, according
to intelligence staff, is that the agency does not have the staff to
analyze large quantities of telephone conversations.

Mike Frost's expos of Canadian "embassy collection" operations
described the NSA computers they used, called Oratory, that can
"listen" to telephone calls and recognize when keywords are spoken.
Just as we can recognize words spoken in all the different tones and
accents we encounter, so too, according to Frost, can these computers.
Telephone calls containing keywords are automatically extracted from
the masses of other calls and recorded digitally on magnetic tapes for
analysts back at agency headquarters. However, high volume voice
recognition computers will be technically difficult to perfect, and my
New Zealand-based sources could not confirm that this capability
exists. But, if or when it is perfected, the implications would be
immense. It would mean that the UKUSA agencies could use machines to
search through all the international telephone calls in the world, in
the same way that they do written messages. If this equipment exists
for use in embassy collection, it will presumably be used in all the
stations throughout the ECHELON network. It is yet to be confirmed how
extensively telephone communications are being targeted by the ECHELON
stations for the other agencies.

The easiest pickings for the ECHELON system are the individuals,
organizations,and governments that do not use encryption. In New
Zealand's area, for example, it has proved especially useful against
already vulnerable South Pacific nations which do not use any coding,
even for government communications (all these communications of New
Zealand's neighbors are supplied, unscreened, to its UKUSA allies). As
a result of the revelations in my book, there is currently a project
under way in the Pacific to promote and supply publicly available
encryption software to vulnerable organizations such as democracy
movements in countries with repressive governments. This is one
practical way of curbing illegitimate uses of the ECHELON
capabilities.

One final comment. All the newspapers, commentators, and "well placed
sources" told the public that New Zealand was cut off from US
intelligence in the mid-1980s. That was entirely untrue. The
intelligence supply to New Zealand did not stop, and instead, the
decade since has been a period of increased integration of New Zealand
into the US system. Virtually everything the equipment, manuals,
ways of operating, jargon, codes, and so on, used in the GCSB
continues to be imported entirely from the larger allies (in practice,
usually the NSA). As with the Australian and Canadian agencies, most of
the priorities continue to come from the US, too.

The main thing that protects these agencies from change is their
secrecy. On the day my book arrived in the book shops, without prior
publicity, there was an all-day meeting of the intelligence bureaucrats
in the prime minister's department trying to decide if they could
prevent it from being distributed. They eventually concluded, sensibly,
that the political costs were too high. It is understandable that they
were so agitated.

Throughout my research, I have faced official denials or governments
refusing to comment on publicity about intelligence activities. Given
the pervasive atmosphere of secrecy and stonewalling, it is always hard
for the public to judge what is fact, what is speculation, and what is
paranoia. Thus, in uncovering New Zealand's role in the NSA-led
alliance, my aim was to provide so much detail about the operations
the technical systems, the daily work of individual staff members, and
even the rooms in which they work inside intelligence facilities that
readers could feel confident that they were getting close to the truth.
I hope the information leaked by intelligence staff in New Zealand
about UKUSA and its systems such as ECHELON will help lead to change.
CAQ SUBSCRIPTION INFORMATION CAQ (CovertAction Quarterly) has won
numerous awards for investigative journalism. In 1996, it won 4 of
"Project Censored" top 25 awards for investigative reporting. CAQ is
read around the world by investigative reporters, activists, scholars,
intelligence buffs, news junkies, and anyone who wants to know the news
and analysis behind the soundbites and headlines. Recommended by Noam
Chomsky; targeted by the CIA.
from: http://whatreallyhappened.com/RANCHO/POLITICS/ECHELON/echelon.html

Yo can even see echelon products on: http://www.echelon.com/products/

Nice articel about echelon was edited on BBC news back in 1999:

Echelon spy network revealed
Listening in to your phone calls and reading your emails
By Andrew Bomford of BBC Radio 4's PM programme

Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet.

It sounds like science fiction, but it's true.

Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist and politicians on both sides of the Atlantic are calling for an inquiry.

On the North Yorkshire moors above Harrogate they can be seen for miles, but still they are shrouded in secrecy. Around 30 giant golf balls, known as radomes, rise from the US military base at Menwith Hill.

Linked to the NSA

Inside is the world's most sophisticated eavesdropping technology, capable of listening-in to satellites high above the earth.

Menwith
Facility is said to be capable of 2m intercepts per hour
The base is linked directly to the headquarters of the US National Security Agency (NSA) at Fort Mead in Maryland, and it is also linked to a series of other listening posts scattered across the world, like Britain's own GCHQ.

The power of the network, codenamed Echelon, is astounding.

Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.

Open Oz

The network is so secret that the British and American Governments refuse to admit that Echelon even exists. But another ally, Australia, has decided not to be so coy.

The man who oversees Australia's security services, Inspector General of Intelligence and Security Bill Blick, has confirmed to the BBC that their Defence Signals Directorate (DSD) does form part of the network.

"As you would expect there are a large amount of radio communications floating around in the atmosphere, and agencies such as DSD collect those communications in the interests of their national security", he said.

Asked if they are then passed on to countries like Britain and America, he said: "They might be in certain circumstances."

But the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analysed.

Journalist Duncan Campbell has spent much of his life investigating Echelon. In a report commissioned by the European Parliament he produced evidence that the NSA snooped on phone calls from a French firm bidding for a contract in Brazil. They passed the information on to an American competitor, which won the contract.

"There's no safeguards, no remedies, " he said, "There's nowhere you can go to say that they've been snooping on your international communications. Its a totally lawless world."

Breaking the silence

Both Britain and America deny allegations like this, though they refuse to comment further. But one former US army intelligence officer has broken the code of silence.

Colonel Dan Smith told the BBC that while this is feasible, it is not official policy: "Technically they can scoop all this information up, sort through it, and find what it is that might be asked for," he said. "But there is no policy to do this specifically in response to a particular company's interests."

Legislators on both sides of the Atlantic are beginning to sit up and take notice. Republican Congressman Bob Barr has persuaded congress to open hearings into these and other allegations.

In December he is coming to Britain to raise awareness of the issue. In an interview with the BBC he accused the NSA of conducting a broad "dragnet" of communications, and "invading the privacy of American citizens."

He is joined in his concerns by a small number of politicians In Britain. Liberal Democrat MP Norman Baker has tabled a series of questions about Menwith Hill, but has been met with a wall of silence.

"There's no doubt it's being used as a listening centre," he said, "There's no doubt it's being used for US interests, and I'm not convinced that Britain's interests are being best served by this."

on: http://news.bbc.co.uk/2/hi/503224.stm

The most intriguing info is about ex France President Mitterrand ddin't succeed to buy Arabian willingness to open their country for French investments and cooperation, information gathered about Mitterrand bribery were gathered by NSA and echelon, even more intriguing was the fact that in stead of that US investors knew who is willing to take bribery and for how much (thanks to the job prior done by French) so US easily filled empty space and commenced with multi billion dollars business in Saudi Arabia.

Big Brother keeps money floating right to Wall Street :evil:
 
I found a washington post blog, which may be where the information came from:

_http://blog.washingtonpost.com/spy-talk/2010/05/cia_group_had_wacky_ideas_to_d.html
 
SAO said:
I found a washington post blog, which may be where the information came from:

_http://blog.washingtonpost.com/spy-talk/2010/05/cia_group_had_wacky_ideas_to_d.html

That's the one he was referencing, and notice that there is no actual admission that the CIA made the tape and that that article is headlined "wacky idea". What is mentioned is that the CIA did make a video of bin laden and friends sitting around a campfire drinking, but that they scrapped it.

So relying on what was admitted, we can say that the CIA officially has a history of trying to make fake videos of their arch Arab enemies.
 
Hmmm, notice the massive dessensitizing campaign that has been waged over years and years, 1stly starting off as fiction in movie, to conspiracy theory, to the media now.

The CIA can confess all they want to now, they can even come out and say 911 was an inside job or was done with complicity from certain aspects of the government and you know what... People would passively stare at this before yapping afew words and then continuing with there daily business whatever it was, whether going to the mall, grocery store to get some greens or whatever.

That is what happens when we have all been zombie-fied.... No one cares... The truth sadly in this case shall not set you free because there are still a trillion lies that linger in the dark.
 
An accurate assessment of the situation I think. The process is one of slowly unveiling the real nature of the powers that be, and in the process destroying the people's sense that they are able to do anything about it. It's like the proverbial (and entirely false) analogy of slowly turning up the heat on a frog in a pot of water. Frogs eventually jump out before their lives are in danger, human beings however, appear to be rather more resilient to noticing the walls closing in around them.

Having said that, I'm not holding my breath for any accurate revelations about 9/11.
 
i wonder if their testing the "sleep level" of people, what can they let out causing what reaction from people, or are they intentionally teasing people? i don't know whenever something like this comes out i always get this eerie feeling of "there must be something else behind it".

i don't know let's see where this all stops
 
Alejo said:
[SNIP] or are they intentionally teasing people? i don't know whenever something like this comes out i always get this eerie feeling of "there must be something else behind it".[SNIP]

You reminded me of SOTT article 08 Jul 2007 called:

Transmarginal Inhibition

And Laura's posting from 2007

Transmarginal Inhibition - We are being treated like dogs

Maybe some acts by the PTB that seem to tease those of us that are hoping to see some truth coming out could possibly be part of the Transmarginal Inhibition thing because it alternately adds stress and then seemingly relieve it.

Well, maybe now that I think of it maybe this is not so clear example. So take it for what its worth, nevertheless this concept of Transmarginal Inhibition is pretty key to understanding our world though, I think. Or what do you think?
 
Back
Top Bottom