Cyberdefense blurs borders

June 13, 2009

Cyberwar

Privacy May Be a Victim in Cyberdefense Plan

By THOM SHANKER and DAVID E. SANGER

WASHINGTON – A plan to create a new Pentagon cybercommand is raising significant privacy and diplomatic concerns, as the Obama administration moves ahead on efforts to protect the nation from cyberattack and to prepare for possible offensive operations against adversaries’ computer networks.

President Obama has said that the new cyberdefense strategy he unveiled last month will provide protections for personal privacy and civil liberties. But senior Pentagon and military officials say that Mr. Obama’s assurances may be challenging to guarantee in practice, particularly in trying to monitor the thousands of daily attacks on security systems in the United States that have set off a race to develop better cyberweapons.

Much of the new military command’s work is expected to be carried out by the National Security Agency, whose role in intercepting the domestic end of international calls and e-mail messages after the Sept. 11, 2001, attacks, under secret orders issued by the Bush administration, has already generated intense controversy.

There is simply no way, the officials say, to effectively conduct computer operations without entering networks inside the United States, where the military is prohibited from operating, or traveling electronic paths through countries that are not themselves American targets.

The cybersecurity effort, Mr. Obama said at the White House last month, “will not – I repeat, will not – include monitoring private sector networks or Internet traffic.”

But foreign adversaries often mount their attacks through computer network hubs inside the United States, and military officials and outside experts say that threat confronts the Pentagon and the administration with difficult questions.

Military officials say there may be a need to intercept and examine some e-mail messages sent from other countries to guard against computer viruses or potential terrorist action. Advocates say the process could ultimately be accepted as the digital equivalent of customs inspections, in which passengers arriving from overseas consent to have their luggage opened for security, tax and health reasons.

“The government is in a quandary,” said Maren Leed, a defense expert at the bipartisan Center for Strategic and International Studies who was a Pentagon special assistant on cyberoperations from 2005 to 2008.

Ms. Leed said a broad debate was needed “about what constitutes an intrusion that violates privacy and, at the other extreme, what is an intrusion that may be acceptable in the face of an act of war.”

In a recent speech, Gen. James E. Cartwright, vice chairman of the Joint Chiefs of Staff and a chief architect of the new cyberstrategy, acknowledged that a major unresolved issue was how the military – which would include the National Security Agency, where much of the cyberwar expertise resides – could legally set up an early warning system.

Unlike a missile attack, which would show up on the Pentagon’s screens long before reaching American territory, a cyberattack may be visible only after it has been launched in the United States.

“How do you understand sovereignty in the cyberdomain?” General Cartwright asked. “It doesn’t tend to pay a lot of attention to geographic boundaries.”

For example, the daily attacks on the Pentagon’s own computer systems, or probes sent from Russia, China and Eastern Europe seeking chinks in the computer systems of corporations and financial institutions, are rarely seen before their effect is felt inside the United States.

Some administration officials have begun to discuss whether laws or regulations must be changed to allow law enforcement, the military or intelligence agencies greater access to networks or Internet providers when significant evidence of a national security threat was found.

Ms. Leed said that while the Defense Department and related intelligence agencies were the only organizations that had the ability to protect against such cyberattacks, “they are not the best suited, from a civil liberties perspective, to take on that responsibility.”

Under plans being completed at the Pentagon, the new cybercommand will be run by a four-star general, much the way Gen. David H. Petraeus runs the wars in Afghanistan and Iraq from Central Command in Tampa, Fla. But the expectation is that whoever is in charge of the new command will also direct the National Security Agency, an effort to solve the turf war between the spy agency and the military over who is in charge of conducting offensive operations.

While the N.S.A.’s job is chiefly one of detection and monitoring, the agency also possesses what Michael D. McConnell, the former director of national intelligence, called “the critical skill set” to respond quickly to cyberattacks. Yet the Defense Department views cyberspace as its domain as well, a new battleground after land, sea, air and space.

The complications are not limited to privacy concerns. The Pentagon is increasingly worried about the diplomatic ramifications of being forced to use the computer networks of many other nations while carrying out digital missions – the computer equivalent of the Vietnam War’s spilling over the Cambodian border in the 1960s. To battle Russian hackers, for example, it might be necessary to act through the virtual cyberterritory of Britain or Germany or any country where the attack was routed.

General Cartwright said military planners were trying to write rules of engagement for scenarios in which a cyberattack was launched from a neutral country that might have no idea what was going on. But, with time of the essence, it may not be possible, the scenarios show, to ask other nations to act against an attack that is flowing through their computers in milliseconds.

“If I pass through your country, do I have to talk to the ambassador?” General Cartwright said. “It is very difficult. Those are the questions that are now really starting to emerge vis-à-vis cyber.”

Frida Berrigan, a longtime peace activist who is a senior program associate at the New America Foundation’s arms and security initiative, expressed concerns about whether the Obama administration would be able to balance its promise to respect privacy in cyberspace even as it appeared to be militarizing cybersecurity.

“Obama was very deliberate in saying that the U.S. military and the U.S. government would not be looking at our e-mail and not tracking what we do online,” Ms. Berrigan said. “This is not to say there is not a cyberthreat out there or that cyberterrorism is not a significant concern. We should be vigilant and creative. But once again we see the Pentagon being put at the heart of it and at front lines of offering a solution.”

Ms. Berrigan said that just as the counterinsurgency wars in Iraq and Afghanistan had proved that “there is no front line anymore, and no demilitarized zone anymore, then if the Pentagon and the military services see cyberspace as a battlefield domain, then the lines protecting privacy and our civil liberties get blurred very, very quickly.”

Source: http://www.nytimes.com/2009/06/13/us/politics/13cyber.html?_r=1&th&emc=th

NSA data-mining grows in San Antonio

This article came from a San Antonio alternative paper.  The NSA has a regional signal intelligence (sigint) facility under the pineapple fields of Kunia.  They threaten you too if you try to take photos.  But the military is now upgrading to a new facility in Whitmore that will house both Navy and NSA intelligence facilities.  See http://the.honoluluadvertiser.com/article/2007/Aug/31/ln/hawaii708310326.html

SAN ANTONIO CURRENT
12/3/2008

The panopticon economy

The NSA’s new data-mining facility is one component of a growing local surveillance industry

by Greg M. Schwartz

[PHOTO: It looks innocent enough, but no loitering, please: The NSA’s Texas Cryptology Center, under construction at 410 and West Military. Greg M. Schwartz photo]

Surrounded by barbwire fencing, the anonymous yet massive building on West Military Drive near San Antonio’s Loop 410 freeway looms mysteriously with no identifying signs of any kind. Surveillance is tight, with security cameras surrounding the under-construction building. Readers are advised not to take any photos unless you care to be detained for at least a 45-minute interrogation by the National Security Agency, as this reporter was.

There’s a strangely blurry line during such an interrogation. After viewing the five photos I’d taken of the NSA’s new Texas Cryptology Center, the NSA officer asked if I would delete them. When I asked if he was ordering me to do so, he said no; he was asking as a personal favor. I declined and was eventually released.

America’s top spy agency has taken over the former Sony microchip plant and is transforming it into a new data-mining headquarters – oddly positioned directly across the street from a 24-hour Walmart – where billions of electronic communications will be sifted in the agency’s mission to identify terrorist threats.

“No longer able to store all the intercepted phone calls and e-mail in its secret city, the agency has now built a new data warehouse in San Antonio, Texas,” writes author James Bamford in the Shadow Factory, his third book about the NSA. “Costing, with renovations, upwards of $130 million, the 470,000-square-foot facility will be almost the size of the Alamodome. Considering how much data can now be squeezed onto a small flash drive, the new NSA building may eventually be able to hold all the information in the world.”

Bamford’s book focuses on the NSA’s transformation since 9/11, with the impetus for the new facility being a direct ramification of those attacks. At the time, the NSA had only about 7 percent of its facilities outside the Washington D.C./Baltimore area. But the realization that additional attacks could virtually wipe out the agency catalyzed a regional expansion. [See “Secret Agency Man,” November 5, 2008.]

The new facility is a potential boon to the local economy since it’s reportedly going to employ around 1,500 people, but questions remain about whether there will be adequate oversight to prevent civil-rights violations like Uncle Sam’s recent notorious warrantless wiretapping program. The NSA would suggest the facility’s ability to sort through surveillance data is one of America’s top defenses against terrorist threats, but the NSA’s presence comes with concerns that abuse of its secretive power could see the agency become akin to the “Thought Police” of 1984, George Orwell’s classic novel depicting the nightmare of a total surveillance society – and all for nothing. Even as the facility is completed, a new government-backed report has concluded that data surveillance is an ineffective method for identifying potential terrorists or preventing attacks.

So just what will be going on inside the NSA’s new San Antonio facility? Bamford describes former NSA Director Mike Hayden’s goals for the data-mining center as knowing “exactly what Americans were doing day by day, hour by hour, and second by second. He wanted to know where they shopped, what they bought, what movies they saw, what books they read, the toll booths they went through, the plane tickets they purchased, the hotels they stayed in… In other words, Total Information Awareness, the same Orwellian concept that John Poindexter had tried to develop while working for the Pentagon’s [Defense Advanced Research Projects Agency].”

Bamford details how Hayden, now head of the CIA, had originally leaned toward being overprotective of civil rights, not wanting to see the NSA revisit the scandal-ridden era of the 1970s and the violations of “Project Shamrock.” But 9/11 altered Hayden’s philosophical direction 180 degrees. The Total Information Awareness project supposedly died when the plan was exposed, Poindexter resigned, and Congress cut off further funding. But Bamford and others have reported that the project simply migrated to the NSA, “an agency with a far better track record than DARPA for keeping secrets.”

The NSA remembers the Alamo
The NSA was waffling on selection of a home for its new facility when the City of San Antonio sent a mission to NSA headquarters in January 2007 to lobby for it, part of a continuing effort to woo the agency. On January 18, Microsoft announced its selection of San Antonio for a new data center. The NSA followed suit three months later. Bexar County Judge Nelson Wolff was part of the effort to entice the NSA to choose San Antonio. He says talks centered on economic factors and what the city could do to facilitate the NSA’s plans.

“They’re pretty tight on what they do; they don’t share that information with you,” says Wolff. “I hope that the administration will be addressing [civil-rights violations], and I hope they’re correcting those concerns.”

Bamford writes about how NSA and Microsoft had both been eyeing San Antonio for years because it has the cheapest electricity in Texas, and the state has its own power grid, making it less vulnerable to power outages on the national grid. He notes that it seemed the NSA wanted assurance Microsoft would be here, too, before making a final commitment, due to the advantages of “having their miners virtually next door to the mother lode of data centers.” The new NSA facility is just a few miles from Microsoft’s data center of the same size. Bamford says that under current law, NSA could gain access to Microsoft’s stored data without even a warrant, but merely a fiber-optic cable.

“What the Microsoft people will have will be just storage of a lot of the email that is being sent. They keep this email – I don’t know why – and there should be some legislation saying how long it should be kept,” said Bamford in a phone interview last week. “The post office doesn’t keep copies of our letters when we mail letters; why should the telecom companies or the internet providers keep copies of our email? It doesn’t make sense to me. But there’s no legislation. So they need a place to store it, and that’s where they’re storing all this stuff.”

(Microsoft did not return a call for comment before press deadline.)

The new NSA facility boosts the agency’s already formidable presence in South Texas, where they have 2,000 employees on the Medina Annex of the Lackland Air Force Base – mostly Signals Intelligence, or Sigint, specialists, who use cutting-edge technology to intercept anything from faxes to emails and satellite communications.

NSA’s new facility also gives the agency easy access to UTSA’s Institute for Cyber Security and the school’s Center for Infrastructure Assurance and Security. The ICS was founded in 2007 with a $3.5-million grant from the Texas Emerging Technology Fund to continue efforts to protect American communities against cyber-attacks, with the CIAS – a think tank launched in 2001 – being rolled into the ICS. All of this led U.S. Representative Ciro Rodriguez (D-San Antonio) to declare San Antonio “the center of cybersecurity, in the country and the world.”

ICS Founding Executive Director Ravi Sandhu acknowledges some synergy between the NSA presence in San Antonio and UTSA’s cybersecurity work.

“Cybersecurity in the public domain has largely been about defense, but there’s certainly an attack component to it. To some degree, the U.S. Department of Defense and intelligence agencies are now starting to talk about the attack component in the public domain,” says Sandhu.

Sandhu says UTSA’s cybersecurity students are recruited by many of San Antonio’s local employers and doesn’t doubt that NSA is one of them. “Recruiting is one end … but it’s an attractive thing for NSA employees [too]. They can further their education – they can do degrees part-time, they can do advanced degrees … so there are advantages beyond direct recruitment of NSA students.”

Does automated data mining even work?
While the opening of the NSA’s massive new data center heightens existing civil-rights concerns, a new report from the National Research Council questions whether such data-mining is even effective. Sponsored by the Department of Homeland Security and the National Science Foundation and released in October of this year, the report suggests that pattern-based data-mining is not even a viable way to identify terrorists.

The 352-page study -“Protecting Individual Privacy in the Struggle Against Terrorists” – concludes that identification of terrorists through automated data-mining “is neither feasible as an objective nor desirable as a goal of technology development efforts.” It also says inevitable false positives will result in “ordinary, law-abiding citizens and businesses” being erroneously flagged as suspects.

“Actions such as arrest, search, or denial of rights should never be taken solely on the basis of an automated data-mining result,” says the report. The question, then, is how rigorously will human analysts vet such information before alleged leads are pursued, and who has oversight of the process?

“Part of the problem is … jurisdiction over national-security issues is very divided in Congress. You have the Homeland Security committee, the Justice committee, but, of course, you also have some basic issues – government oversight, appropriations,” says Professor Fred Cate, the NRC committee member who wrote most of the report and who serves as director of Indiana University’s Center for Applied Cybersecurity Research. “So I think in some ways one of the issues is the need for a more streamlined oversight system so that somebody takes responsibility for it.”

Cate says the migration of the TIA project to the NSA is part of the problem.

“Because so many different agencies are involved and because there are no consistent oversight mechanisms, it’s very hard [to monitor]. And Congress created a Privacy and Civil Liberties Oversight Board, and then it didn’t like the way it created it initially, so then it recreated it with more powers, but it never confirmed any members to it,” says Cate. “So for the past year, there’s been nobody in that critical position. So I think one immediate step for Congress and the new president will be to nominate members and get them confirmed.”

The lack of clearly delineated oversight remains a vital yet unsolved issue. Senator Jay Rockefeller (D-W.Virginia), Chairman of the Senate Intelligence Committee, would appear to be the Congressman with the most power to pursue such oversight.

“Eisenhower warned of the military-industrial complex, but now it’s mostly the security, industrial complex; it’s these people that build all the hardware and software for Homeland Security and Intelligence and all that,” says Bamford. “As far as I can see, nobody has a handle on how many contractors are out there, what they’re doing, how much money’s going to them, how much is useful, how much is wasted money.”

Cate says the NRC committee is not necessarily opposed to data-mining in principal, but is concerned about how it’s carried out. “The question is can you do it and make it work so that you don’t intrude unnecessarily into privacy and so that you reach reliable conclusions.”

Bamford writes in the Shadow Factory of how the NSA’s Georgia listening post has eavesdropped on Americans during the Iraq War, including journalists, without a warrant or any indication of terrorism. He also reports on NSA eavesdropping on undecided members of the United Nations Security Council in the run-up to the vote on the Iraq War resolution, with the Bush regime seeking information with which to twist the arms of voting countries. The spying was only revealed due to British Parliament whistleblower Claire Short, who admitted she’d read secret transcripts of UN Secretary-General Kofi Annan’s confidential conversations.

“The UN people have been aware of [NSA eavesdropping] for a long time, but there’s not much they can do about it,” says Bamford.

A common response to concerns about data surveillance is that those who keep their noses clean have nothing to worry about. But the reach of the NSA’s surveillance net combined with lack of oversight and the political paranoia escalated by the 9/11 attacks means that almost anyone could wind up on the terrorist watch list.

“The principal end product of all that data and all that processing is a list of names – the watch list – of people, both American and foreign, thought to pose a danger to the country,” writes Bamford. “Once containing just twenty names, today it is made up of an astonishing half a million – and it grows rapidly every day. Most on the list are neither terrorists nor a danger to the country, and many are there simply by mistake.”

Bamford reports that consequences of being on the list could include having an application for a Small Business Administration loan turned down; having a child’s application to one of the military academies rejected; or, because the names are shared with foreign governments, being turned away after landing in Europe for a vacation or business trip. All without ever being told why.

A senior intelligence official concerned about the situation told Bamford “the system is a disaster,” adding that the list at the National Counterterrorism Center isn’t even compatible with the NSA and CIA systems.

“They could be snooping on just about anything right now and not be accountable and be able to hold their hands up and go, ‘Our system doesn’t track that,’ when in many cases the system does, but the code is so convoluted you could never know it,” says the official.

Bamford also reports on Uncle Sam’s skyrocketing use of “national security letters” for obtaining personal information. The NSLs, which do not require probable cause or court approval, jumped from 8,500 in 2000 to 143,074 between 2003 and 2005, according to a 2007 Justice Department inspector general’s report. Under the revised version of the 1994 Communications Assistance for Law Enforcement Act, it’s not only a crime for any company to refuse to cooperate, it’s also become a crime for company officials to even disclose their cooperation.

“There was a lot of pressure by the FBI in ’94 to have CALEA enacted … but the Clinton Administration was in favor of doing all that,” says Bamford.

The question for us then becomes who, if anyone, is watching the watchdogs? One organization devoted to such duty is the Electronic Frontier Foundation, a San Francisco-based non-profit whose mission is to protect electronic civil liberties. Reducing the use of NSLs to gag and acquire data from online service providers is one of the planks in EFF’s proposed privacy agenda for the new Obama administration.

“The issue here is that when people are gagged, you can’t talk about it and [people] don’t know what kind of abuses there are,” says EFF media-relations coordinator Rebecca Jeschke. The EFF privacy agenda also includes repealing or repairing the FISA Amendments Act, reforming the Electronic Communications Privacy Act, and reform of the State Secrets Privilege, the latter which has been used by the Bush regime to shield its electronic surveillance activity from judicial review.

The EFF filed a lawsuit against the NSA in September on behalf of AT&T customers who were victims of warrantless wiretapping, with defendants including President Bush, Vice President Cheney, and NSA Director Keith Alexander. The EFF also filed suit against AT&T – until this summer headquartered in San Antonio, the telecom giant still maintains a sizable presence here – for participating in the illegal surveillance program, and is challenging the FISA Amendments Act passed by Congress in July – which gave retroactive immunity to the telecom companies – as being unconstitutional.

“Where I disagreed was the immunity to telecommunications entities … and that’s why I couldn’t support something that provided for the immunity provision,” says U.S. Representative Charlie Gonzalez (D-San Antonio) of the FISA Amendments Act. “We had something that we thought in the House was good, and then the Senate did their own thing. But I was never happy with the inclusion of the blanket-immunity provision to telecommunications entities, because I thought it relieved them of a responsibility and duty that they owe as corporate citizens.”

Gonzalez added that he thinks “there’s still tremendous shortcomings in the law when it comes to making sure that you don’t have abuses of the authority of eavesdropping.”

The Electronic Privacy Information Center in Washington, D.C., a public interest research group whose mission is similar to EFF’s, is suing the Department of Justice for access to documents authored by government lawyers regarding President Bush’s warrantless wiretapping program. These opinions, prepared by the Office of Legal Counsel, provided the legal rationale for Uncle Sam to wiretap American citizens in the United States without court approval. On October 31, a federal judge ordered the DOJ to provide for independent judicial inspection of documents relating to the program.

The latest news in Uncle Sam’s ongoing surveillance scandal happens to come from the FBI’s involvement with the NSA. The Washington Times reported in November that Supervisory Special Agent Bassem Youssef, who oversees the FBI’s role in the NSA’s warrantless surveillance program, says the FBI engaged in unlawful acts while carrying out that surveillance. Youssef, who now fears career retaliation for stepping up as a whisteblower, is due to testify with the Justice Department.

Whether or not the new Obama administration will enact any demonstrable change in the personnel and policies that created the civil-rights violations of recent years remains a question mark.

“Everything I’ve seen so far with Obama has not been focused on change. It’s been focused on bringing back the old Clinton Administration or continuing the same,” says Bamford, noting the President-elect’s decisions to nominate Hillary Clinton as Secretary of State and keep Robert Gates as Secretary of Defense. Bamford mentions Wisconsin Senator Russ Feingold as someone he feels would fight for greater accountability.

“That’s a person I would like to see rewarded for making the right decision, instead of people being rewarded for making the wrong decisions,” says Bamford of Feingold’s record in voting against the revised FISA Amendments Act and being the only senator to vote against the Patriot Act.

Bamford ends The Shadow Factory by quoting Senator Frank Church, the first chairman of the Senate Intelligence Committee, during the original hearings on the NSA in the 1970s. “If a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology,” said Church more than three decades ago.

That technology now sees its latest evolution occurring at the shadowy building on San Antonio’s West Military Drive. •

© 2009 San Antonio Current

Source: http://www.sacurrent.com/news/story.asp?id=69607

Peace activists deflate dome of Waihopai spy base

Statement issued 6.30pm 4 May 2008:

ANZAC PLOUGHSHARES DEFLATE AND UNMASK WAIHOPAI

waihopai

At 6am on the morning of the 30 April three people entered the Waihopai Spy Base and used a sickle to deflate one of the two 30 metre domes covering satellite interception dishes.

The group then built a shrine and prayed for the victims of the war with no end – the so-called ‘War on Terror’ led by the United States.

They took such action because they felt compelled to non-violently respond to the Bush Administration’s admission that intelligence gathering is the most important tool of the ‘War on Terror’.

The ECHELON spy network, including Waihopai, is an important part of the US government’s global spy network.

Despite New Zealand government opposition to the US-led invasion of Iraq, Waihopai could have been used to spy on UN Security Council members so the US could more easily ‘persuade’ them to favour the invasion.

Waihopai is funded by the New Zealand taxpayer yet its activities are shrouded in secrecy. All that is needed for Waihopai’s continued operation and our subsequent complicity to the ‘War on Terror’ is our silence.

We ask you to support such non-violent action against Waihopai, New Zealand’s most significant contribution to the ‘War on Terror’, a war that has resulted in illegal military invasions, illegal detention and torture and an unprecedented attack on civil liberties in all Western democracies.

– – – – – – –

Original Statement issued 6.30am 30 April:

STATEMENT OF THE WAIHOPAI ANZAC PLOUGHSHARES

They shall beat their swords into ploughshares, their spears into pruning hooks; nation shall not lift sword against nation; and there shall be no more training for war. Isaiah 2:4

Waihopai Spy Base Penetrated

This morning, 30 April 2008, we entered the Waihopai Spy Base near Blenheim.

Our group, including a Dominican Priest, temporarily closed the base by padlocking the gates and proceeded to deflate one of the large domes covering two satellite dishes.

At 6am we cut through three security fences surrounding the domes – these are armed with razor wire, infrared motion sensors and a high voltage electrified fence.

Once inside we used sickles to cut one of the two 30-metre white domes, built a shrine and knelt in prayer to remember the people killed by United States military activity.

We have financed our activities through personal savings, additional part-time employment and a small interest-free loan from one of our supporters.

We are responding to the Bush administration’s admission that intelligence gathering is the most important tool in the so-called War on Terror. This war will have no end until citizens of the world refuse to let it continue. The ECHELON spy network including Waihopai, is an important part of the US government’s global spy network and we have come in the name of the Prince of Peace to close it down.

The base is funded by New Zealand tax payers and located on New Zealand soil which makes New Zealand a target through our association with the UKUSA intelligence cooperation agreement.

Five years ago the Clark government opposed the US-led invasion of Iraq. Yet at the same time the Bush administration was using the National Security Agency’s ECHELON system, of which Waihopai is an integral component, to spy on UN Security Council members so it could more easily swing them in favour of an invasion.

There have been over 100 Ploughshares actions over the last twenty years around the world. Ploughshares direct actions are linked through the common factors of: entry to locations connected to military activity, Christian prayers and most involve some form of property destruction.

– – – – –

About Waihopai & ECHELON

Green MP Keith Locke quoting the Anti-Bases Campaign claims the base has cost New Zealand up to NZ$500million since 1989. The base intercepts electronic communications throughout the Pacific region including New Zealand and is often staffed by personnel from US agencies.

In 1996 researcher Nicky Hager published an expose on Waihopai and New Zealand’s strong links to the USA-led ECHELON network of six similar spy stations around the world. The United Nations launched an investigation in 2003 to claims that ECHELON had been used by the US government to eavesdrop on UN diplomats and Security Council members. A report published in 2000 showed that ECHELON had also been used by the US to gain commercial advantage for US corporations.

Information gathered at Waihopai is transferred to the Government Communications Security Bureau (GCSB) in Wellington and fed unseen directly to Washington DC.

Source: http://ploughshares.org.nz/original-statement/

 OpenCUNY » login | join | terms | activity 

 Supported by the CUNY Doctoral Students Council.  

OpenCUNY.ORGLike @OpenCUNYLike OpenCUNY

false