Listening In 

The U.S.-led echelon spy network is eavesdropping on the whole world 

by Jason Vest 

Talk back! [email protected]   More articles

Suppose, this past weekend, you sent an e-mail to a friend overseas. There's a reasonable possibility your communication was intercepted by a global surveillance system--especially if you happened to discuss last week's bombings in East Africa. 

Or suppose you're stuck in traffic and in your road rage you whip out a cell phone and angrily call your congressman's office in Washington. There's a chance the government is listening in on that conversation, too (but only for the purposes of "training" new eavesdroppers). 

Or suppose you're on a foreign trip--vacation, business, relief work--and you send off a fax to some folks that Washington doesn't view too keenly. Your message could be taken down and analyzed by the very same system. 

That system is called ECHELON and it is controlled by the U.S. National Security Agency (NSA). In America, it is the Intelligence Network That Dare Not Be Acknowledged. Questions about it at Defense Department briefings are deftly deflected. Requests for information about it under the Freedom of Information Act linger in bureaucratic limbo. Researchers who mention possible uses of it in the presence of intelligence officials are castigated. Members of Congress--theoretically, the people's representatives who provide oversight of the intelligence community--betray no interest in helping anyone find out anything about it. Media outlets (save the award-winning but low-circulation Covert Action Quarterly) ignore it. In the official view of the U.S. Government, it doesn't exist. 

But according to current and former intelligence officials, espionage scholars, Australian and British investigative reporters, and a dogged New Zealand researcher, it is all too real. Indeed, a soon-to-be finalized European Parliament report on ECHELON has created quite a stir on the other side of the Atlantic. The report's revelations are so serious that it strongly recommends an intensive investigation of NSA operations. 

The facts drawn out by these sources reveal ECHELON as a powerful electronic net--a net that snags from the millions of phone, fax, and modem signals traversing the globe at any moment selected communications of interest to a five-nation intelligence alliance. Once intercepted (based on the use of key words in exchanges), those communiqués are sent in real time to a central computer system run by the NSA; round-the-clock shifts of American, British, Australian, Canadian, and New Zealand analysts pour over them in search of . . . what? 

Originally a Cold War tool aimed at the Soviets, ECHELON has been redirected at civilian targetsworldwide. In fact, as the European Parliament report noted, political advocacy groups like Amnesty International and Greenpeace were amongst ECHELON's targets. The system's awesome potential (and potential for abuse) has spurred some traditional watchdogs to delve deep in search of its secrets, and even prompted some of its minders within the intelligence community to come forward. "In some ways," says Reg Whittaker, a professor and intelligence scholar at Canada's York University, "it's probably the most useful means of getting at the Cold War intelligence-sharing relationship that still continues." 

While the Central Intelligence Agency--responsible for covert operations and human-gathered intelligence, or HUMINT--is the spy agency most people think of, the NSA is, in many respects, the more powerful and important of the U.S. intelligence organizations. Though its most egregious excesses of 20 years ago are believed to have been curbed, in addition to monitoring all foreign communications, it still has the legal authority to intercept any communication that begins or ends in the U.S., as well as use American citizens' private communications as fodder for trainee spies. Charged with the gathering of signals intelligence, or SIGINT--which encompasses all electronic communications transmissions--the NSA is larger, better funded, and infinitely more secretive than the CIA. Indeed, the key document that articulates its international role has never seen the light of day. 

That document, known as the UKUSA Agreement, forged an alliance in 1948 among five countries--the U.S., Britain, Australia, Canada, and New Zealand--to geographically divvy up SIGINT-gathering responsibilities, with the U.S. as director and main underwriter. Like the NSA--hardly known until the Pike and Church congressional investigations of the '70s--the other four countries' SIGINT agencies remain largely unknown and practically free of public oversight. While other member nations conduct their own operations, there has "never been any misunderstanding that we're NSA subsidiaries," according to Mike Frost, an ex-officer in Canada's SIGINT service, the Communications Security Establishment (CSE). Moreover, all the signatory countries have NSA listening posts within their borders that operate with little or no input from the local agency. 

Like nature, however, journalism abhors a vacuum, and the dearth of easily accessible data has inspired a cadre of researchers around the world to monitor the SIGINT community as zealously as possible. It is not, says David Banisar of the Electronic Privacy Information Center (EPIC), an easy task. Getting raw data is difficult enough. Figuring out what it means even more so, he says, thanks in part to the otherwise conservative NSA's very liberal use of code names--many of which regularly change--for everything from devices to operations. One that appears to have remained constant, however, is ECHELON. 

In 1988, Margaret Newsham, a contract employee from Lockheed posted at Menwith Hill, the NSA's enormous listening post in Yorkshire, England, filed a whistleblower suit against Lockheed, charging the company with waste and mismanagement (the case is currently being appealed after an initial dismissal). At the same time, Newsham told Congressional investigators that she had knowledge of illegal eavesdropping on American citizens by NSA personnel. While a committee began investigating, it never released a report. Nonetheless, British investigative reporter Duncan Campbell managed to get hold of some of the committee's findings, including a slew of Menwith Hill operations. Among them was a project described as the latest installment of a system code named ECHELON that would enable the five SIGINT agencies "to monitor and analyze civilian communications into the 21st century." 

To SIGINT watchers, the concept wasn't unfamiliar. In the early '80s, while working on his celebrated study of the NSA, The Puzzle Palace, James Bamford discovered that the agency was developing a system called PLATFORM, which would integrate at least 52 separate SIGINT agency computer systems into one central network run out of Fort Meade, Maryland. Then in 1991, an anonymous British SIGINT officer told the TV media about an ongoing operation that intercepted civilian telexes and ran them through computers loaded with a program called "the Dictionary"--a description that jibed with both Bamford and Campbell's gleanings. 

In 1996, however, intelligence watchdogs and scholars got an avalanche of answers about ECHELON, upon the publication of Secret Power: New Zealand's Role in the International Spy Network,written by Nicky Hager. A New Zealand activist turned investigative author, Hager spent 12 years digging into the ties between his country's SIGINT agency, the Government Communications Security Bureau (GCSB), and the NSA. Utilizing leaked material and scores of interviews with GCSB officers, Hager not only presented a revealing look at the previously unknown machinations of the GCSB (even New Zealand's Prime Minister was kept in the dark about its full scope) but also produced a highly detailed description of ECHELON. 

According to Hager's information--which leading SIGINT scholar and National Security Archive analyst Jeffrey Richelson calls "excellent"--ECHELON functions as a real-time intercept and processing operation geared toward civilian communications. Its first component targets international phone company telecommunications satellites (or Intelsats) from a series of five ground intercept stations located at Yakima, Washington; Sugar Grove, West Virginia; Morwenstow in Cornwall, England; Waihopai, New Zealand; and Geraldton, Australia. 

The next component targets other civilian communications satellites, from a similar array of bases, while the final group of facilities intercept international communications as they're relayed from undersea cables to microwave transmitters. According to Hager's sources, each country devises categories of intercept interest. Then a list of key words or phrases (anything from personal, business, and organization names to e-mail addresses to phone and fax numbers) is devised for each category. The categories and keywords are entered by each country into its "Dictionary" computer, which, after recognizing keywords, intercepts full transmissions, and sends them to the terminals of analysts in each of the UKUSA countries. 

To the layperson, ECHELON may sound like something out of the X-Files. But the National Security Archives's Richelson and others maintain that not only is this not the stuff of science fiction, but is, in some respects, old hat. More than 20 years ago, then CIA director William Colby matter-of-factly told congressional investigators that the NSA monitored every overseas call made from the United States. Two years ago, British Telecom accidentally disclosed in a court case that it had provided the Menwith Hill station with equipment potentially allowing it access to hundreds of thousands of European calls a day. "Let me put it this way," says a former NSA officer. "Consider that anyone can type a keyword into a Net search engine and get back tens of thousands of hits in a few seconds." A pause. "Assume that people working on the outer edges have capabilities far in excess of what you do." 

Since earlier this year, ECHELON has caused something of a panic in Europe, following the disclosure of an official European Parliament report entitled "In Appraisal of Technologies of Political Control." While the report did draw needed attention to ECHELON, it--and subsequent European press coverage--says Richelson, "built ECHELON up into some super-elaborate system that can listen in on everyone at any time, which goes beyond what Nicky Hager wrote." Richelson, along with other SIGINT experts, emphasizes that, despite ECHELON's apparent considerable capabilities, it isn't omniscient. 

EPIC's David Banisar points out that despite the high volume of communications signals relayed by satellite and microwave, a great many fiber-optic communications--both local and domestic long distance--can't be intercepted without a direct wiretap. And, adds Canadian ex-spook Mike Frost, there's a real problem sorting and reading all the data; while ECHELON can potentially intercept millions of communications, there simply aren't enough analysts to sort through everything. "Personally, I'm not losing any sleep over this," says Richelson, "because most of the stuff probably sits stored and unused at [NSA headquarters in] Fort Meade." 

Richelson's position is echoed by some in the intelligence business ("Sure, there's potential for abuse," says one insider, "but who would you rather have this--us or Saddam Hussein?"). But others don't take such a benign view. "ECHELON has a huge potential for violating privacy and for abuses of democracy," says Hager. "Because it's so powerful and its operations are so secret that there are no real constraints on agencies using it against any target the government chooses. The excessive secrecy built up in the Cold War removes any threat of accountability." 

The only time the public gets anything resembling oversight, Hager contends, is when intelligence officials have a crisis of conscience, as several British spooks did in 1992. In a statement to the London Observer, the spies said they felt they could "no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment we operate"--the establishment in question being the Government Communications Headquarters (GCHQ), Britain's version of the NSA. The operatives said that an intercept system based on keyword recognition (sound familiar?) was routinely targeting the communications of Amnesty International and Christian Aid. 

Adds Hager, "The use of intelligence services in these cases had nothing to do with national security, but everything to do with keeping tabs on critics. The British government frequently finds itself in political conflict with Amnesty over countries it is supplying arms to or governments with bad human rights records. ECHELON provides the government with a way to gain advantage over Amnesty by eavesdropping on their operations." 

Hager and others also argue that potential for abuse lies in the hierarchical and reciprocal nature of the UKUSA alliance. According to data gathered by congressional committees in the '70s, and accounts of former SIGINT officers like Frost, UKUSA partners have, from time to time, used each other to circumvent prohibitions on spying on their own citizens. Frost, for example, directed Canadian eavesdropping operations against both Americans and Britons--at the request of both countries' intelligence services, to whom the surveillance data was subsequently passed. 

And British Members of Parliament have raised concerns for years about the lack of oversight at the NSA's Menwith Hill facility--a base on British soil with access to British communications yet run by the NSA, which works closely with the GCHQ. "Given that both the U.S. and Britain turn their electronic spying systems against many other friendly and allied nations," says Hager, "the British would be naive not to assume it is happening to them." 

David Banisar, the electronic privacy advocate, says that apparently just asking about ECHELON, or mentioning anything like it, is considered unreasonable. Since earlier this year, Banisar has been trying to get information on ECHELON from the NSA under the Freedom of Information Act. "They're not exactly forthcoming," he says, explaining that he only recently got a response in which he was in effect told the European Parliament report "didn't provide enough information" for the NSA to locate the requested information. However, Wayne Madsen, co-author with Bamford of the most recent edition of The Puzzle Palace, was more directly discouraged from investigating ECHELON's possibly dubious applications, as the following story makes clear. 

On April 21, 1996, Chechnyen rebel leader Dzokhar Dudayev was killed when a Russian fighter fired two missiles into his headquarters. At the time of the attack, Dudayev had been talking on his cellular phone to Russian officials in Moscow about possible peace negotiations. According to electronics experts, getting a lock on Dudayev's cell phone signal would not have been difficult, but as Martin Streetly, editor of Jane's Radar and Electronic Warfare Systems, noted at the time, the Russian military was so under-equipped and poorly maintained, it was doubtful a radar intercept plane could have honed in on the signal without help. 

Speaking at a conference on Information Warfare a month later, Madsen, one of the world's leading SIGINT and computer security experts, explained that it was both politically and technically possible that the NSA helped the Russians kill Dudayev. Noting the West's interest in preserving the Yeltsin presidency and in ensuring the safety of an oil consortium's pipeline running through Chechnya, Madsen explained which NSA satellites could have been used to intercept Dudayev's call and directionally locate its signal. 

This wasn't exactly a stunning revelation: Not only had reports recently been released in Australia and Switzerland about police tracking suspects by their cell phone signatures, but Reuters and Agence France-Press had written about the Dudayev scenario as technically plausible. Still, after his talk, Madsen was approached by an Air Force officer assigned to the NSA, who tore into him. "Don't you realize that we have people on the ground over there?" Madsen recalled the officer seething. "You're talking about things that could put them in harm's way." Asks Madsen, "If this was how Dudayev died, do you think it's unreasonable the American people know about the technical aspects behind this kind of diplomacy?" 

Nicky Hager says that the New Zealand intelligence officers who talked to him did so out of a growing disillusionment with the importance to New Zealand of access to ECHELON information. In some cases, they said, they had been so busy listening in on targets of interest to other countries, they altogether missed opportunities to gather intelligence in New Zealand's national interest. Ross Coulthart, an investigative reporter with Australia's Nine Network, says intelligence sources of his have reported similar feelings. "In the UKUSA intelligence community, there appear, roughly, to be two camps: those who believe that it's best to fall in line behind the U.S., because the U.S. has acted as protector and funder and gives us resources and limited participation in a system we couldn't support ourselves, and those who think the whole thing is somewhat overrated and sometimes contrary to national interests." 

In 1995, for example, Australian intelligence officials leaked a story to the Australian Broadcasting Company that was, at first blush, damaging to themselves: Australian intelligence had bugged the Chinese Embassy in Canberra. However, the Australians had no access to the actual transmissions; they had merely planted the bugs at the behest of the NSA, which was getting the raw feed. "Given that both Australian and American companies were bidding for Chinese wheat contracts at the time," says Coulthart, "it didn't seem like Australia was getting anything out of this arrangement, so they put the story out there." 

Indeed, says York University's Whittaker, "there's a really important degree of [economic] tension that wasn't there during the Cold War. On the other hand, most of the threats perceived as common and borderless--terrorism, nuclear proliferation, weapons of mass destruction, and global crime--inspire more cooperation between the UKUSA partners." Hager thinks such cooperation is certainly merited, but what ECHELON to some extent reflects, he believes, is the continued erosion of civil liberties and the notion of sovereignty in the name of security. "Some people I interviewed told me repeatedly, 'It's a good thing for us to be part of this strong alliance,' " he says. "What it amounts to, in the end, is an argument for being a cog in a big intelligence machine." 

This document last modified Tuesday, August 11, 1998, 12:56 PM EDT.