People are shocked by the scope of secret state spying on their private communications, especially in light of documentary evidence leaked to media outlets by former NSA contractor Edward Snowden.
While the public is rightly angered by the illegal, unconstitutional nature of NSA programs which seize and store data for retrospective harvesting by intelligence and law enforcement officials, including the content of phone calls, emails, geolocational information, bank records, credit card purchases, travel itineraries, even medical recordsâ€“in secret, and with little in the way of effective oversightâ€“the historical context of how, and why, this vast spying apparatus came to be is often given short shrift.
Revelations about NSA spying didnâ€™t begin June 5, 2013 however, the day when The Guardian published a top secret FISA Court Order to Verizon, ordering the firm turn over the telephone records on millions of its customers â€œon an ongoing daily basis.â€
Before PRISM there was ECHELON: the top secret surveillance program whose all-encompassing â€œdictionariesâ€ (high-speed computers powered by complex algorithms) ingest and sort key words and text scooped-up by a global network of satellites, from undersea cables and land-based microwave towers.
Past as Prologue
Confronted by a dizzying array of code-named programs, the casual observer will assume the spymasters running these intrusive operations are all-knowing mandarins with their fingers on the pulse of global events.
Yet, if disastrous US policies from Afghanistan and Iraq to the ongoing capitalist economic meltdown tell us anything, it is that the American superpower, in President Nixonâ€™s immortal words, really is â€œa pitiful, helpless giant.â€
In fact, the same programs used to surveil the population at large have also been turned inward by the National Security State against itself and targets military and political elites who long thought themselves immune from such close attention.
Coupled with Snowdenâ€™s disclosures, those of former NSA officer Russell Tice (first reported here and here), revealed that the agencyâ€“far in excess of the dirt collected by FBI spymaster J. Edgar Hoover in his â€œsecret and confidentialâ€ black filesâ€“has compiled dossiers on their alleged controllers, for political leverage and probably for blackmail purposes to boot.
While Ticeâ€™s allegations certainly raised eyebrows and posed fundamental questions about who is really in charge of American policyâ€“elected officials or unaccountable securocrats with deep ties to private security corporationsâ€“despite being deep-sixed by US media, they confirm previous reporting about the agency.
When investigative journalist Duncan Campbell first blew the lid off NSAâ€™s ECHELON program, his 1988 piece for New Statesman revealed that a whistleblower, Margaret Newsham, a software designer employed by Lockheed at the giant agency listening post at Menwith Hill in North Yorkshire, England, stepped forward and told the House Permanent Select Committee on Intelligence in closed session, that NSA was using its formidable intercept capabilities â€œto locate the telephone or other messages of target individuals.â€
Campbellâ€™s reporting was followed in 1996 by New Zealand investigative journalist Nicky Hagerâ€™s groundbreaking book, Secret Power, the first detailed account of NSAâ€™s global surveillance system. A summary of Hagerâ€™s findings can be found in the 1997 piece that appeared in CovertAction Quarterly.
As Campbell was preparing that 1988 article, a report in the Cleveland Plain Dealer alleged that arch-conservative US Senator Strom Thurman was one target of agency phone intercepts, raising fears in political circles that â€œNSA has restored domestic, electronic, surveillance programmes,â€ said to have been dialed-back in the wake of the Watergate scandal.
Ironically enough, congressional efforts to mitigate abuses by the intelligence agencies exposed by the Church and Pike Committees in the 1970s, resulted in the 1978 creation of the Foreign Intelligence Surveillance Court. However, as The New York Times reported July 7, that court â€œin more than a dozen classified rulings . . . has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans,â€ a â€œparallel Supreme Courtâ€ whose rulings are beyond legal challenge.
In an 88-page report on ECHELON published in 2000 by the Electronic Privacy Information Center (EPIC) Newsham said that when she worked on the development of SILKWORTH at the secret US base, described as â€œa system for processing information relayed from signals intelligence satellites,â€ she told Campbell and other reporters, including CBS Newsâ€™ 60 Minutes, that â€œshe witnessed and overheardâ€ one of Thurmanâ€™s intercepted phone calls.
Like Thomas Drake, the senior NSA official prosecuted by the Obama administration under the 1917 Espionage Act, for information he provided The Baltimore Sun over widespread waste, fraud and abuse in the agencyâ€™s failed Trailblazer program, Newsham had testified before Congress and filed a lawsuit against Lockheed over charges of sexual harassment, â€œcorruption and mis-spending on other US government â€˜blackâ€™ projects.â€
A year earlier, in a 1999 on the record interview with the Danish newspaper Ekstra Bladet, Newsham spoke to journalists Bo Elkjaer and Kenan Seeberg, telling them of her â€œconstant fearâ€ that â€œcertain elementsâ€ within the US secret state would â€œtry to silence herâ€; a point not lost on Edward Snowden today.
â€œAs a result,â€ the newspaper reported, â€œshe sleeps with a loaded pistol under her mattress, and her best friend is Mr. Guntherâ€“a 120-pound German shepherd that was trained to be a guard and attack dog by a good friend in the Nevada State Police.â€
â€œTo me,â€ the whistleblower said, â€œthere are only two issues at stake here: right or wrong. And the longer I worked on the clandestine surveillance projects, the more I could see that they were not only illegal, but also unconstitutional.â€
â€œEven then,â€ between 1974 and 1984 when she worked on ECHELON, it â€œwas very big and sophisticated.â€
â€œAs early as 1979 we could track a specific person and zoom in on his phone conversation while he was communicating,â€ Newsham averred. â€œSince our satellites could in 1984 film a postage stamp lying on the ground, it is almost impossible to imagine how all-encompassing the system must be today.â€
When queried about â€œwhich part of the system is named Echelon,â€ Newsham told the reporters: â€œThe computer network itself. The software programs are known as SILKWORTH and SIRE, and one of the most important surveillance satellites is named VORTEX. It intercepts things like phone conversations.â€
Despite evidence presented in her congressional testimony about these illegal operations, â€œno substantive investigation took place, and no report was made to Congress,â€ Campbell later wrote.
â€œSince then,â€ the British journalist averred, â€œinvestigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident, but was designed into the system from the start.â€ (emphasis added)
This would explain why members of Congress, the federal Judiciary and the Executive Branch itself, as Tice alleges, tread lightly when it comes to crossing NSA. However, as information continues to emerge about these privacy-killing programs it should also be clear that the agencyâ€™s prime targets are not â€œterrorists,â€ judges or politicians, but the American people themselves.
In fact, as Snowden stated in a powerful message published by WikiLeaks: â€œIn the end the Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless. No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promisedâ€“and it should be.â€
How did we get here? Is there a direct line from Cold War-era programs which targeted the Soviet Union and their allies, and which now, in the age of capitalist globalization, the epoch of planet-wide theft and plunder, now targets the entire worldâ€™s population?
ECHELONâ€™s Roots: The UKUSA Agreement
Lost in the historical mists surrounding the origins of the Cold War, the close collaboration amongst Britain and the United States as they waged war against Nazi Germany and Imperial Japan, by warâ€™s end had morphed into a permanent intelligence-military alliance which predated the founding of NATO. With the defeat of the Axis powers, a new global division of labor was in the offing led by the undisputed superpower which emerged from the conflagration, the United States.
Self-appointed administrator over Europeâ€™s old colonial holdings across Africa, Asia and the Middle East (the US already viewed Latin America as its private export dumping ground and source for raw materials), the US used its unparalleled position to benefit the giant multinational American firms grown larger and more profitable than ever as a result of wartime economic mobilization managed by the state.
By 1946, the permanent war economy which later came to be known as the Military-Industrial Complex, a semi-command economy directed by corporate executives, based on military, but also on emerging high-tech industries bolstered by taxpayer-based government investments, was already firmly entrenched and formed the political-economic base on which the so-called â€œAmerican Centuryâ€ was constructed.
While resource extraction and export market domination remained the primary goal of successive US administrations (best summarized by the slogan, â€œthe business of government is businessâ€), advances in technology in general and telecommunications in particular, meant that the systemâ€™s overlords required an intelligence apparatus that was always â€œonâ€ as it â€œcapturedâ€ the flood of electronic signals coursing across the planet.
The secret British and US agencies responsible for cracking German, Japanese and Russian codes during the war found themselves in a quandary. Should they declare victory and go home or train their sights on the new (old) adversaryâ€“their former ally, the Soviet Unionâ€“but also on home grown and indigenous communist and socialist movements more generally?
In opting for the latter, the UK-US wartime partnership evolved into a broad agreement to share signals and communications intelligence (SIGINT and COMINT), a set-up which persists today.
In 1946, Britain and the United States signed the United Kingdom-United States of America Agreement (UKUSA), a multilateral treaty to share signals intelligence amongst the two nations and Britainâ€™s Commonwealth partners, Canada, Australia and New Zealand. Known as the â€œFive Eyesâ€ agreement, the treaty was such a closely-guarded secret that Australiaâ€™s Prime Minister was kept in the dark until 1973!
In 2010, the British National Archives released previously classified Government Communications Headquarters (GCHQ) files that provide an important historical overview of the agreement. Also in 2010, the National Security Agency followed suit and published formerly classified files from their archives. Accompanying NSAâ€™s release was a 1955 amended version of the treaty.
Itâ€™s secretive nature is clearly spelled out: â€œIt will be contrary to this Agreement to reveal its existence to any third party unless otherwise agreed by the two parties.â€
In 2005, 2009 and 2013, The National Security Archive published a series of previously classified documents obtained from NSA under the Freedom of Information Act that revealed agency thinking on a range of subjects, from global surveillance to cyberwar.
What we have learned from these sources and reporting by Duncan Campbell and Nicky Hager, are that the five agencies feeding the surveillance behemoth, Americaâ€™s NSA, Britainâ€™s GCHQ, Canadaâ€™s Communications Security Establishment (CSE), Australiaâ€™s Defence Signals Directorate (DSD) and New Zealandâ€™s Government Communications Security Bureau (GCSB), are subdivided into first and second tier partners, with the US, as befitting a hyperpower, forming the â€œ1st partyâ€ and the UK, Australia, Canada and New Zealand forming â€œ2nd partyâ€ partners.
Under terms of UKUSA, intelligence â€œproductsâ€ are defined as â€œ01. Collection of traffic. 02. Acquisition of communications documents and equipment. 03. Traffic analysis. 04. Cryptanalysis. 05. Decryption and translation. 06. Acquisition of information regarding communications organizations, procedures, practices and equipment.â€
â€œSuch exchange,â€ NSA informed us, â€œwill be unrestricted on all work undertaken except when specifically excluded from the agreement at the request of either party and with the agreement of the other.â€
â€œIt is the intention of each party,â€ weâ€™re told, â€œto limit such exceptions to the absolute minimum and to exercise no restrictions other than those reported and mutually agreed upon.â€
This certainly leaves wide latitude for mischief as we learned with the Snowden disclosures.
Amid serious charges that â€œFive Eyesâ€ were illegally seizing industrial and trade secrets from â€œ3rd partyâ€ European partners such as France and Germany, detailed in the European Parliamentâ€™s 2001 ECHELON report, it should be clear by now that since its launch in 1968 when satellite communications became a practical reality, ECHELON has evolved into a global surveillance complex under US control.
The Global Surveillance System Today
The echoes of those earlier secret programs reverberate in todayâ€™s headlines.
Last month, The Guardian reported that the â€œcollection of trafficâ€ cited in UKUSA has been expanded to GCHQâ€™s â€œability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.â€
Then on July 6, The Washington Post disclosed that NSA has tapped directly into those fiber optic cables, as AT&T whistleblower Mark Klein described to Wired Magazine in 2006, and now scoops-up petabyte scale communications flowing through the US internet backbone. The agency was able to accomplish this due to the existence of â€œan internal corporate cell of American citizens with government clearances.â€
â€œAmong their jobs documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.â€
Following up on July 10, the Post published a new PRISM slide from the 41-slide deck provided to the paper by Edward Snowden.
The slide revealed that â€œtwo types of collectionâ€ now occur. One is the PRISM program that collects information from technology firms such as Google, Apple and Microsoft. The second source is â€œa separate category labeled â€˜Upstream,â€™ described as accessing â€˜communications on fiber cables and infrastructure as data flows pastâ€™.â€
Recently, Der Spiegel, reported that NSA averred the agency â€œdoes NOT target its 2nd party partners, nor request that 2nd parties do anything that is inherently illegal for NSA to do.â€ This is an outright falsehood exposed by former Canadian Communications Security Establishment (CSE) officer Mike Frost.
In a 1997 CovertAction Quarterly exposÃ©, Frost recounted how â€œCSE operated alone or joined with NSA or GCHQ to: intercept communications in other countries from the confines of Canadian embassies around the world with the knowledge of the ambassador; aid politicians, political parties, or factions in an allied country to gain partisan advantage; spy on its allies; spy on its own citizens; and perform â€˜favorsâ€™ that helped its allies evade domestic laws against spying.â€
â€œThroughout it all,â€ Frost insisted, â€œI was trained and controlled by US intelligence which told us what to do and how to do it.â€
Everyone else, Der Spiegel reports, is fair game. â€œFor all other countries, including the group of around 30 nations that are considered to be 3rd party partners, however, this protection does not apply. â€˜We can, and often do, target the signals of most 3rd party foreign partners,â€™ the NSA boasts in an internal presentation.â€
It should also be clear that targeting isnâ€™t strictly limited to the governments and economic institutions of â€œ3rd party foreign partners,â€ but extends to the private communications of their citizens. Der Spiegel, citing documents supplied by Snowden, reported that the agency â€œgathered metadata from some 15 million telephone conversations and 10 million Internet datasets.â€ The newsmagazine noted that â€œthe Americans are collecting from up to half a billion communications a month in Germany,â€ describing the surveillance as â€œa complete structural acquisition of data.â€
Despite hypocritical protests by European governments, on the contrary, Snowden disclosed that those â€œ3rd partyâ€ partners are joined at the hip with their â€œFive Eyesâ€ cousins.
In a recent interview with Der Spiegel, Snowden was asked if â€œGerman authorities or German politicians [are] involved in the NSA surveillance system?â€
â€œYes, of course. Weâ€™re in bed together with the Germans the same as with most other Western countries. For example, we tip them off when someone we want is flying through their airports (that we for example, have learned from the cell phone of a suspected hackerâ€™s girlfriend in a totally unrelated third countryâ€“and they hand them over to us. They donâ€™t ask to justify how we know something, and vice versa, to insulate their political leaders from the backlash of knowing how grievously theyâ€™re violating global privacy.â€
Disclosing new information on how UKUSA functions today, Snowden told the German newsmagazine: â€œIn some cases, the so-called Five Eye Partners go beyond what NSA itself does. For instance, the UKâ€™s General [sic] Communications Headquarters (GCHQ) has a system called TEMPORA.â€
â€œTEMPORA,â€ the whistleblower averred, â€œis the signals intelligence communityâ€™s first â€˜full-takeâ€™ Internet buffer that doesnâ€™t care about content type and pays only marginal attention to the Human Rights Act. It snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit.â€
â€œRight now,â€ Snowden said, â€œthe buffer can hold three days of traffic, but thatâ€™s being improved. Three days may not sound like much, but remember that thatâ€™s not metadata. â€˜Full-takeâ€™ means it doesnâ€™t miss anything, and ingests the entirety of each circuitâ€™s capacity. If you send a single ICMP packet and it routes through the UK, we get it. If you download something and the CDN (Content Delivery Network) happens to serve from the UK, we get it. If your sick daughterâ€™s medical records get processed at a London call center . . . well, you get the idea.â€
We do; and thanks to Edward Snowden we now know that everyone is a target.
Republished with permission from: Global Research