CIA Book of World Facts, CIA facts, CIA history, CIA activities, CIA agent, how to become CIA, Secret Service, CIA and the military, CIA artificial intelligence, CIA branch, CIA case, CIA case officer, CIA clandestine operations, CIA counterintelligence, CIA covert operations, CIA covert operations list, CIA Cult of Intelligence, CIA dark web, CIA detective, CIA director, CIA hidden operations, CIA illegal operations, CIA operations, CIA operations list, CIA operations officer, CIA overseas operations, CIA biggest secrets, CIA classified secrets, secret history of CIA, top CIA secrets, best CIA agents, CIA espionage, CIA secret agent, CIA special agent, CIA surveillance, former CIA spy, spy lie, CIA declassified, CIA documents, CIA declassified documents, adam and eve CIA document, adam and eve declassified, adam and eve declassified CIA, adam and eve declassified story, adam and eve story CIA declassified, adam and eve story declassified, all declassified CIA documents, best declassified CIA documents, CIA declassified adam and eve, CIA declassified adam and eve story, CIA declassified book, CIA declassified documents 2020, CIA declassified documents 2022, CIA declassified files, CIA disclosed documents, CIA files released, CIA gov declassified, CIA gov declassified documents, CIA gov documents, CIA government documents, CIA library declassified, CIA programs declassified, CIA released, CIA released documents, CIA released documents 2022, CIA secret documents, CIA website declassified, CIA website declassified documents, CIA website documents, classified CIA documents, declassified adam and eve, declassified adam and eve story, declassified CIA manuals, declassified documents online, declassified documents released, declassified files CIA, declassified military documents, declassify documents, latest declassified CIA documents, list of declassified CIA documents, new declassified CIA documents, recent declassified CIA documents, recently declassified documents, released CIA document, the adam and eve declassified story, the adam and eve story CIA declassified, the adam and eve story declassified, top secret CIA declassified documents.

Operation ECHELON: Five Countries Built a Secret System to Spy on the Entire World Including Their Own Citizens

Right now, somewhere above you, a satellite is passing. You cannot see it. You cannot hear it. It carries no…

Right now, somewhere above you, a satellite is passing. You cannot see it. You cannot hear it. It carries no weapons, drops no bombs, threatens nothing that you can point to or name. But it is listening. It is collecting. Every signal that rises from the surface of the Earth every phone call bounced through a relay tower, every fax transmitted across a copper line, every email routed through a server, every telex, every microwave transmission, every radio signal carrying the ordinary and extraordinary business of human civilization passes through space, and something up there is catching it. Sorting it. Reading it. Storing it. And has been, without interruption, since before most people alive today were born.

The system has a name. It is called ECHELON. And for forty years, the governments that built it, operated it, and benefited from it told their own citizens, their own parliaments, and their own courts that it did not exist.

To understand ECHELON, you have to go back to the end of the Second World War and a document that almost nobody outside the intelligence community has ever read. In 1946, the United States and the United Kingdom signed the UKUSA Agreement a signals intelligence sharing arrangement that formalized the wartime cooperation between their codebreaking operations.

The agreement was classified at the highest levels. Its existence was not officially acknowledged by either government for more than sixty years. But in the immediate postwar world, with the Soviet Union emerging as the defining threat of the coming era, the agreement made strategic sense. America had signals collection capabilities that Britain lacked. Britain had geographic positioning and existing infrastructure that America needed. Together, they could cover more of the world’s communications traffic than either could alone.

Over the following decade, three more English-speaking nations joined the arrangement. Canada in 1948. Australia and New Zealand in 1956. The five nations the United States, the United Kingdom, Canada, Australia, and New Zealand became what the intelligence community calls the Five Eyes. A signals intelligence alliance unlike anything that had existed before.

Each nation agreed to share the raw intelligence it collected with the others. Each nation agreed to avoid spying on the others’ citizens a provision that would, in time, become one of the most debated and most violated clauses in the entire agreement. Each nation agreed to maintain absolute secrecy about the arrangement’s existence and scope.

What they built together, across the following decades, was ECHELON. Not a single installation, not a single system, but a global network of collection stations, satellites, undersea cable taps, and processing centers that together covered virtually every significant communications channel on the planet.

Dictionary computers massive systems designed to scan intercepted communications for specific keywords, names, phrases, and topics of interest processed the raw take and flagged material for human analysis. The scale was, by any measure, extraordinary. And it grew continuously, expanding its technical capabilities and its geographic reach with every passing decade.

The physical infrastructure of ECHELON is one of the most remarkable engineering achievements of the Cold War and one of the least discussed. Across five continents, listening stations were constructed at locations chosen for their ability to intercept specific categories of communications. Menwith Hill in North Yorkshire, England a facility operated by the NSA on British soil, its distinctive white geodesic radomes visible for miles across the moorland was one of the largest and most important nodes in the network.

Its radomes the white spherical structures that house sensitive antenna systems and protect them from weather and from visual observation became one of the most recognized symbols of a surveillance apparatus that officially did not exist. RAF Menwith Hill employed thousands of American NSA personnel on British territory, processing an extraordinary volume of European communications traffic.

Pine Gap, near Alice Springs in the remote Australian outback, was another critical node a joint Australian-American facility that controlled signals intelligence satellites and processed their take. Waihopai Station in New Zealand’s South Island. Leitrim in Canada. Buckley Air Force Base in Colorado. Bad Aibling Station in Germany. Shoal Bay in Australia’s Northern Territory. The stations were spread across the globe with the deliberate geometry of maximum coverage each positioned to capture the specific slice of global communications traffic that its location made accessible. Together, they left almost no signal pathway on Earth uncovered.

The satellites were the system’s most powerful component. ECHELON’s space-based collection assets operated primarily by the NSA through its National Reconnaissance Office included satellites positioned to intercept communications relayed through commercial telecommunications satellites. In the 1970s and 1980s, the majority of international telephone calls and telexes were relayed through INTELSAT satellites positioned in geostationary orbit.

ECHELON’s collection satellites were positioned to intercept the signals beamed up to and down from those commercial satellites effectively tapping every international telephone call that used the system. The interception was passive, invisible, and technically undetectable by the parties communicating. It required no physical access, no warrant, no legal process in any jurisdiction. The signal traveled through space, and ECHELON caught it there.

The undersea cable component added a further dimension. Beginning in the 1970s, and dramatically expanding through the 1980s and 1990s, the NSA and GCHQ developed capabilities to access the fiber optic and copper cables that carry the majority of international telecommunications traffic beneath the world’s oceans. Specially modified submarines could approach cable landing points and attach inductive taps devices that copied the electrical signals passing through the cables without physically interrupting them. The tapped material was recorded and periodically retrieved, or in some installations, transmitted in compressed bursts to collection satellites above. The technical complexity of these operations was extraordinary. The intelligence value was commensurate.

What the UKUSA partners did with this collected material is where the story becomes most uncomfortable. The UKUSA Agreement’s prohibition on spying on partner nations’ citizens created a legal problem but also a legal solution. If the NSA was legally prohibited from intercepting the domestic communications of American citizens without a warrant, it could ask GCHQ to intercept those same communications and share the take under the intelligence sharing agreement.

If GCHQ faced similar legal constraints on intercepting British citizens’ communications, NSA could perform that function. The allied intelligence services were, in effect, outsourcing domestic surveillance to each other using the alliance structure to circumvent the legal protections that each nation’s laws were supposed to provide to its own citizens. The arrangement was elegant, legally ambiguous, and deeply troubling from the perspective of civil liberties.

The keyword dictionaries that ECHELON used to sort through intercepted material were among the most closely guarded secrets in the entire system. Each Five Eyes partner maintained its own dictionary of search terms words, names, phrases, telephone numbers, addresses that would flag intercepted communications for human review. The dictionaries included obvious national security targets: terrorist organizations, weapons proliferation networks, foreign intelligence services, hostile military communications. But evidence that emerged through the 1990s and early 2000s suggested that the dictionaries also included terms related to commercial and economic intelligence corporate names, contract negotiations, trade deal specifics raising the deeply uncomfortable possibility that the system was being used not just for national security purposes but to give economic advantage to domestic industries competing against foreign rivals.

The European Parliament took this possibility seriously enough to commission a detailed investigation. In 2001, a committee of the European Parliament released a report the Temporary Committee on the ECHELON Interception System report that concluded with high confidence that ECHELON existed, that it was capable of intercepting the communications described, and that there was credible evidence it had been used for commercial espionage.

The report named specific instances in which American companies appeared to have benefited from intelligence obtained through ECHELON about the competing bids of European competitors for major contracts. The governments whose intelligence services operated ECHELON declined to respond substantively to the report’s findings. They neither confirmed nor denied. They said nothing. Because saying anything would have required acknowledging something they had spent decades denying.

The public exposure of ECHELON did not come from a government. It did not come from an official inquiry or a parliamentary investigation. It came, as so many intelligence revelations do, from the patient work of journalists and researchers who pieced together the system’s existence from fragments from the accounts of former intelligence officers, from technical analyses of publicly visible infrastructure, from documents obtained through freedom of information requests in multiple countries, and from the occasional admission carefully qualified, strategically limited of officials who could no longer sustain the denial.

The New Zealand journalist Nicky Hager published a detailed account of ECHELON’s operation and capabilities in 1996 in a book called Secret Power drawing on information from sources inside the New Zealand intelligence community. The book was dismissed officially. Its contents were not refuted.

The NSA itself did not officially acknowledge ECHELON’s existence until 2000 and even then, the acknowledgment was partial, carefully worded, and accompanied by assurances about legal compliance that critics found wholly inadequate given what the system was known to be capable of. The British government has never officially acknowledged the full scope of ECHELON’s capabilities. Neither has Australia. The Five Eyes intelligence sharing arrangement the framework within which ECHELON operates was only officially acknowledged by the British government in 2010, sixty-four years after the UKUSA Agreement that created it was signed.

And then, in June 2013, a young NSA contractor named Edward Snowden walked out of an NSA facility in Hawaii carrying a large quantity of classified documents on a thumb drive, flew to Hong Kong, and handed those documents to journalists at The Guardian and The Washington Post. What Snowden revealed the PRISM program, the bulk telephone metadata collection, the XKeyscore system, the full architecture of post-internet mass surveillance was in many ways an extension and elaboration of what ECHELON had established in the analog era.

The tools were more sophisticated. The scale was larger. The legal frameworks were different. But the fundamental ambition to collect as much of the world’s communications as technically possible, sort it by automated keyword systems, and make it available for intelligence analysis was the same ambition that had driven the UKUSA Agreement’s founders in 1946.

ECHELON did not end with the Cold War. The Soviet communications traffic it had been built to intercept dried up after 1991, but the system’s capabilities found new targets immediately terrorism, weapons proliferation, international crime, economic intelligence. The infrastructure remained. The collection continued. The satellites kept listening. And the governments that operated the system continued, with remarkable consistency, to say as little as possible about what it was, what it collected, and what they did with what it found.

The white radomes at Menwith Hill are still there. You can see them from the road great white spheres rising from the North Yorkshire moorland, each one housing an antenna system pointed at the sky. The facility processes signals intelligence today, as it has for decades. Thousands of NSA personnel work there, on British soil, collecting and processing communications that pass through the airspace above the United Kingdom and beyond.

The legal framework governing what they can collect, under what circumstances, and subject to what oversight has been the subject of continuous political and legal controversy in both the United Kingdom and the United States for the better part of three decades.

What ECHELON established the principle that the communications of the world’s population are collectible, sortable, and analyzable at global scale is the foundation on which every subsequent mass surveillance program has been built. The technical methods have evolved. The legal controversies have deepened. The political arguments about the balance between security and privacy have grown louder and more urgent. But the fundamental architecture five nations sharing signals intelligence under a secret agreement, operating listening stations across the globe, intercepting communications through space and cable and air has not changed in its essential character since the first UKUSA Agreement was signed in the ruins of the postwar world.

They built a system to listen to the world. They told nobody. And the world, for forty years, had absolutely no idea.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *