"What
the East German secret police could only dream of is rapidly becoming
a reality in the free world."
Excerpt
from a study published by the European Parliament.
© European
Parliament 1998
The full document and its translations can be read here.
TABLE
OF CONTENTS
DEVELOPMENTS
IN SURVEILLANCE TECHNOLOGY
NATIONAL & INTERNATIONAL
COMMUNICATIONS INTERCEPTIONS NETWORKS
NSA
INTERCEPTION OF ALL EU TELECOMMUNICATIONS
EU-FBI
GLOBAL TELECOMMUNICATIONS SURVEILLANCE SYSTEM
DEVELOPMENTS IN SURVEILLANCE TECHNOLOGY
New
technologies which were originally conceived for the Defence
and Intelligence sectors have after the cold war rapidly spread
into the law enforcement and private sectors.
By
the 1980's, new forms of electronic surveillance were emerging
and many of these were directed towards automation of communications
interception. This trend was fuelled in the US in the 1990's
by accelerated government funding at the end of the cold war,
with defence and intelligence agencies being refocussed with
new missions to justify their budgets, transferring their technologies
to certain law enforcement applications such as anti-drug and
anti-terror operations.
According
to David Banisar of Privacy International, "To counteract reductions
in military contracts which began in the 1980's, computer and
electronics companies are expanding into new markets - at home
and abroad - with equipment originally developed for the military.
Companies such as E Systems, Electronic Data Systems and Texas
Instruments are selling advanced computer systems and surveillance
equipment to state and local governments that use them for law
enforcement, border control and Welfare administration. What
the East German secret police could only dream of is rapidly
becoming a reality in the free world."
In
recent years the widespread practice of illegal and legal interception
of communications and the planting of 'bugs' has been an issue
in many European States. However, planting illegal bugs is yesterday's
technology. Modern snoopers can buy specially adapted lap top
computers, and simply tune in to all the mobile phones active
in the area by cursoring down to their number. The machine will
even search for numbers 'of interest' to see if they are active.
However, these bugs and taps pale into insignificance next to
the national and international state run interceptions networks.
^^top^^
NATIONAL & INTERNATIONAL COMMUNICATIONS INTERCEPTIONS
NETWORKS
The
Interim Study set out in detail, the global surveillance systems
which facilitate the mass supervision of all telecommunications
including telephone, email and fax transmissions of private citizens,
politicians, trade unionists and companies alike. There has been
a political shift in targeting in recent years. Instead of investigating
crime (which is reactive) law enforcement agencies are increasingly
tracking certain social classes and races of people living in
red-lined areas before crime is committed - a form of pre-emptive
policing deemed data-veillance which is based on military models
of gathering huge quantities of low grade intelligence.
Without
encryption, modern communications systems are virtually transparent
to the advanced interceptions equipment which can be used to
listen in. The Interim Study also explained how mobile
phones have inbuilt monitoring and tagging dimensions which
can be accessed by police and intelligence agencies. For example
the digital technology required to pinpoint mobile phone users
for incoming calls, means that all mobile phone users in a
country when activated, are mini-tracking devices, giving their
owners whereabouts at any time and stored in the company's
computer . For example Swiss Police have secretly tracked the
whereabouts of mobile phone users from the computer of the
service provider Swisscom, which according SonntagsZeitung
had stored movements of more than a million subscribers down
to a few hundred metres, and going back at least half a year.
However,
of all the developments covered in the Interim Study, the section
covering some of the constitutional and legal issues raised by
the USA's National Security Agency's access and facility to intercept
all European telecommunications caused the most concern. Whilst
no-one denied the role of such networks in anti terrorist operations
and countering illegal drug, money laudering and illicit arms
deals, alarm was expressed about the scale of the foreign interceptions
network identified in the Study and whether existing legislation,
data protection and privacy safeguards in the Member States were
sufficient to protect the confidentiality between EU citizens,
corporations and those with third countries.
Since
there has been a certain degree of confusion in subsequent press
reports, it is worth clarifying some of the issues surrounding
transatlantic electronic surveillance and providing a short history & update
on developments since the Interim Study was published in January
1998. There are essentially two separate systems, namely:
(i)
The UK/USA system comprising the activities of military intelligence
agencies such as NSA-CIA in the USA subsuming GCHQ & MI6 in the
UK operating a system known as ECHELON;
(ii)
The EU-FBI system which is linkeding up various law enforcement
agencies such as the FBI, police, customs, immigration and internal
security;
In
intelligence terms, these are two distinct "communities". It
is worth looking briefly at the activities of both systems in
turn, encompassing, Echelon, encryption; EU-FBI surveillance
and new interfaces with for example access to internet providers
and to databanks of other agencies.
^^top^^
NSA INTERCEPTION OF ALL EU TELECOMMUNICATIONS
The
Interim Study said that within Europe, all email, telephone and
fax communications are routinely intercepted by the United States
National Security Agency,
transferring all target information from the European mainland
via the strategic hub of London then by Satellite to Fort Meade
in Maryland via the crucial hub at Menwith Hill in the North
York Moors of the UK.
The
system was first uncovered in the 1970s by a group of researchers
in the UK (Campbell, 1981). A recent work by Nicky Hager, Secret
Power, (Hager, 1996) provides the most comprehensive details
todate of a project known as ECHELON. Hager interviewed more
than 50 people concerned with intelligence to document a global
surveillance system that stretches around the world to form a
targeting system on all of the key Intelsat satellites used to
convey most of the world's satellite phone calls, internet, email,
faxes and telexes. These sites are based at Sugar Grove and Yakima,
in the USA, at Waihopai in New Zealand, at Geraldton in Australia,
Hong Kong, and Morwenstow in the UK.
The
ECHELON system forms part of the UK/USA system but unlike many
of the electronic spy systems developed during the cold war,
ECHELON is designed for primarily non-military targets: governments,
organisations and businesses in virtually every country. The
ECHELON system works by indiscriminately intercepting very large
quantities of communications and then siphoning out what is valuable
using artificial intelligence aids like Memex to find key words.
Five nations share the results with the US as the senior partner
under the UK/USA agreement of 1948, Britain, Canada, New Zealand
and Australia are very much acting as subordinate information
servicers.
Each
of the five centres supply "dictionaries" to the other four of
keywords, phrases, people and places to "tag" and the tagged
intercept is forwarded straight to the requesting country. Whilst
there is much information gathered about potential terrorists,
there is a lot of economic intelligence, notably intensive monitoring
of all the countries participating in the GATT negotiations.
But Hager found that by far the main priorities of this system
continued to be military and political intelligence applicable
to their wider interests.
Hager
quotes from "highly placed intelligence operatives" who spoke
to the Observer in London. "We feel we
can no longer remain silent regarding that which we regard to
be gross malpractice and negligence within the establishment
in which we operate." They gave as examples GCHQ interception
of three charities, including Amnesty International and Christian
Aid. "At any time GCHQ is able to home in on their communications
for a routine target request", the GCHQ source said. In
the case of phone taps the procedure is known as Mantis. With
telexes its called Mayfly. By keying in a code relating to third
world aid, the source was able to demonstrate telex "fixes" on
the three organisations. With no system of accountability, it
is difficult to discover what criteria determine who is not a
target.
Indeed
since the Interim Study was published, journalists have alleged
that ECHELON has benefited US companies involved in arms deals,
strengthened Washington's position in crucial World Trade organisation
talks with Europe during a 1995 dispute with Japan over car part
exports. According to the Financial Mail On Sunday, "key words
identified by US experts include the names of inter-governmental
trade organisations and business consortia bidding against US
companies. The word 'block' is on the list to identify communications
about offshore oil in area where the seabed has yet to be divided
up into exploration blocks"..." It has also been suggested that
in 1990 the US broke into secret negotiations and persuaded Indonesia
that US giant AT & T be included in a multi-billion dollar telecoms
deal that at one point was going entirely to Japan's NEC.
The
Sunday Times (11. May 1998) reported that early on the radomes
at Menwith Hill (NSA station F83) In North Yorkshire UK, were
given the task of intercepting international leased carrrier
(ILC) traffic - essentially, ordinary commercial communications.
Its staff have grown from 400 in the 1980's to more than 1400
now with a further 370 staff from the Ministry of Defence. The
Sunday Times also reported allegations that conversations between
the German company Volkswagen and General Motors were intercepted
and the French have complained that Thompson-CSF, the French
electronics company, lost a $1.4 billion deal to supply Brazil
with a radar system because the Americans intercepted details
of the negotions and passed them on to US company Raytheon, which
subsequently won the contract. Another claim is that Airbus Industrie
lost a contract worth $1 billion to Boeing and McDonnel Douglas
because information was intercepted by American spying. Other
newspapers such as Liberation (21. April 1998) and Il Mondo (20.
March 1998, identify the network as an Anglo-Saxon Spy network
because of the UK-USA axis.
According
to Privacy International, the UK is likely to find its 'Special
relationship' ties fall foul of its Maastricht obligations since
Title V of Maastricht requires that "Member States shall inform
and consult one another within the Council on any matter of foreign
and security policy of general interest in order to ensure that
their combined influence is exerted as effectivelly as possible
by means of concerted and convergent action." Yet under the terms
of the Special relationship, Britain cannot engage in open consultation
with its other European partners. The situation is further complicated
by counter allegations in the French magazine Le Point, that
the French are systematically spying on American and other allied
countries telephone and cable traffic via the Helios 1A Spy satellite
(Times, June 17, 1998).
No
proper Authority in the USA would allow a similar EU spy network
to operate from American soil without strict limitations, if
at all. Following full discussion on the implications of the
operations of these networks, the European Parliament is advised
to set up appropriate independent audit and oversight porocedures
and that any effort to outlaw encryption by EU citizens should
be denied until and unless such democratic and accountable systems
are in place, if at all.
^^top^^
EU-FBI GLOBAL TELECOMMUNICATIONS SURVEILLANCE
SYSTEM
Much
of the documentation and research necessary to put into the public
domain, the history, structure, role and function of the EU-FBI
convention to legitimise global electronic surveillance, has
been secured by Statewatch, the widely respected UK based civil
liberties monitoring and research organisation.
In
February 1997, Statewatch reported that the EU had secretly agreed
to set up an international telephone tapping network via a secret
network of committees established under the "third pillar" of
the Mastricht Treaty covering co-operation on law and order.
Key points of the plan are outlined in a memorandum of understanding,
signed by EU states in 1995 (ENFOPOL 112 10037/95 25.10.95) which
remains classified. According to a Guardian report (25.2.97)
it reflects concern among European Intelligence agencies that
modern technology will prevent them from tapping private communications. "EU
countries," it says, "should agree on international
interception standards set at a level that would ensure encoding
or scrambled words can be broken down by government agencies." Official
reports say that the EU governments agreed to co-operate closely
with the FBI in Washington. Yet earlier minutes of these meetings
suggest that the original initiative came from Washington.
According
to Statewatch, network and service providers in the EU will be
obliged to install "tappable" systems and to place under surveillance
any person or group when served with an interception order.
These
plans have never been referred to any European government for
scrutiny, nor to the Civil Liberties Committee of the European
Parliament, despite the clear civil liberties issues raised by
such an unaccountable system. The decision to go ahead was simply
agreed in secret by "written procedure" through an exchange of
telexes between the 15 EU governments. We are told by Statewatch
the EU-FBI Global surveillance plan was now being developed "outside
the third pillar." In practical terms this means that the plan
is being developed by a group of twenty countries - the then
15 EU member countries plus the USA, Australia, Canada, Norway
and New Zealand. This group of 20 is not accountable through
the Council of Justice and Home Affairs Ministers or to the European
Parliament or national parliaments. Nothing is said about finance
of this system but a report produced by the German government
estimates that the mobile phone part of the package alone will
cost 4 billion D-marks.
Statewatch
concludes that "It is the interface of the ECHELON system and
its potential development on phone calls combined with the standardisation
of tappable communications centres and equipment being sponsored
by the EU and the USA which presents a truly global threat over
which there are no legal or democratic controls" (Press release
25.2.97). In many respects what we are
witnessing here are meetings of operatives of a new global military-intelligence
state. It is very difficult for anyone to get a full picture
of what is being decided at the executive meetings setting this
'Transatlantic agenda.'
© European
Parliament 1998
^^top^^
Go
to Security
|