Page 25 of 89
and translated, it can be compiled into the different types of analy- sis: reports, which are direct and complete translations of inter- cepted messages; "gists", which give basic information on a series of messages within a given category; and summaries, which are compilations from both reports and gists. These are then given classifications: MORAY (secret), SPOKE (more secret than MORAY), UMBRA (top secret), GAMMA (Russian intercepts), and DRUID (intelligence forwarded to non-UKUSA parties). This analysis product is the raison d'étre of the entire ECHELON system. It is also the lifeblood of the UKUSA alliance. The extraordinary ability of ECHELON to intercept most of the reports, which are direct and complete translations of inter- communications traffic in the world is breathtaking in its scope. cepted messages; "gists", which give basic information on a series And yet the power of ECHELON resides in its ability to decrypt, of messages within a given category; and summaries, which are filter, examine and codify these messages into selective categories compilations from both reports and gists. These are then given for further analysis by intelligence agents from the various classifications: MORAY (secret), SPOKE (more secret than UKUSA agencies. MORAY), UMBRA (top secret), GAMMA (Russian intercepts), As the electronic signals are brought into the station, they are and DRUID (intelligence forwarded to non-UKUSA parties). fed through the massive computer systems, such as Menwith This analysis product is the raison d'étre of the entire ECHELON Hill's SILKWORTH, where voice recognition, optical character system. It is also the lifeblood of the UKUSA alliance. recognition (OCR) and data information engines get to work on the messages. These programs and computers transcend state-of- NATIONAL SECURITY & SURVEILLANCE OF CITIZENS the-art; in many cases, they are well into the future. The ECHELON system is the product of the Cold War con- MAGISTRAND is part of the Menwith Hill SILKWORTH flict—an extended battle replete with heightened tensions that supercomputer system that drives the powerful keyword search teetered on the brink of annihilation, and the diminished hostilities programs.“ One tool used to sort through the text of messages, of détente and glasnost. Vicious cycles of mistrust and paranoia PATHFINDER (manufactured by the UK company, Memex),” between the United States and the Soviet empire fed the intelli- sifts through large databases of text-based documents and mes- gence agencies to the point that, with the fall of communism sages looking for keywords and key phrases based on complex throughout Eastern Europe, the intelligence establishment began algorithmic criteria. Voice recognition programs convert conver- to grasp for a mission that justified its bloated existence. sations into text messages for further analysis. One highly But the rise of post-modern warfare—terrorism—gave the advanced system, VOICECAST, can tar- establishment all the justification it need- get an individual's voice pattern so that ed to develop an even greater ability to every call that person makes is tran- i spy on its enemies, its allies and its own scribed for future analysis. In the US there is a concerted citizens. ECHELON is the result of those Processing millions of messages every effort by intelligence agency efforts. The satellites that fly thousands 24 hous day, seven days week ook: | Meas: Federal Taw enforcement Fe iss deails on the eround: the ing for targeted keyword series, phone officials and congressional secret submarines that troll the ocean and fax numbers, and specified voice- representatives to defend the floors and tap into undersea communica- prints. It is important to note that very alti tions cables*'—all power the efficient few messages and phone calls are actual- capabilities of ECHELON. UKUSA signals intelligence machine. ly transcribed and recorded by the sys- In the United States there is a concerted tem. The vast majority are filtered out effort by intelligence agency heads, fed- after they are read or listened to by the system. Only those mes- eral law enforcement officials and congressional representatives sages that produce keyword "hits" are tagged for future analysis. to defend the capabilities of ECHELON. Their persuasive argu- Again, it is not just the ability to collect the electronic signals that ments point to the tragedies seen in the bombings in Oklahoma gives ECHELON its power; it is the tools and technology that are City and the World Trade Center in New York City. The vulnera- able to whittle down the messages to only those that are important bility of Americans abroad, as recently seen in the bombing of the to the intelligence agencies. American Embassy in Dar es Salaam, Tanzania, and in Nairobi, Each station maintains a list of keywords (the Dictionary) des- Kenya, emphasises the necessity of monitoring those forces ignated by each of the participating intelligence agencies. A around the world that would use senseless violence and terror as Dictionary Manager from each of the respective agencies is political weapons against the US and its allies. responsible for adding, deleting or changing the keyword search Intelligence victories add credibility to the arguments that criteria for their Dictionaries at each of the stations.** Each station defend such a pervasive surveillance system. The discovery of Dictionary is given a code-word, such as COWBOY for the missile sites in Cuba in 1962, the capture of the Achille Lauro ter- Yakima facility and FLINTLOCK for the Waihopai facility.” —_rorists in 1995, the discovery of alleged Libyan involvement in These code-words play a crucial identification role for the ana- the bombing of a Berlin discotheque that killed one American lysts who eventually look at the intercepted messages. (resulting in the 1996 bombing of Tripoli), and countless other Each message flagged by the ECHELON Dictionaries as meet- incidents that have been averted (which are now covered by the ing the specified criteria is sorted by a four-digit code represent- silence of indoctrination vows and top-secret classifications), all ing the source or subject of the message (such as 5535 for point to the need for comprehensive signals intelligence gathering Japanese diplomatic traffic, or 8182 for communications about for the national security of the United States. distribution of encryption technology)* as well as the date, time But despite the real threats and dangers to the peace and protec- and station code-word. Also included in the message headers are tion of American citizens at home and abroad, the US the code-names for the intended agency: ALPHA-ALPHA Constitution is quite explicit in limiting the scope and powers of (GCHQ), ECHO-ECHO (DSD), INDIA-INDIA (GCSB), UNI- government. FORM-UNIFORM (CSE), and OSCAR-OSCAR (NSA). These messages are then transmitted to each agency's headquarters viaa _ Editor's Note: global computer system, PLATFORM,” that acts as the informa- In our next issue, part 2 of this article exposes how the ECHELON tion nervous system for the UKUSA stations and agencies. network is being used for political and commercial spying. Every day, analysts located at the various intelligence agencies - review the previous day's product. As it is analysed, decrypted Continued on page 85 government. Editor's Note: In our next issue, part 2 of this article exposes how the ECHELON network is being used for political and commercial spying. 24 - NEXUS THE ECHELON DICTIONARIES Continued on page 85 AUGUST - SEPTEMBER 1999