Send a Tweet
Most Popular Choices
Share on Facebook 10 Share on Twitter 6 Printer Friendly Page More Sharing
Exclusive to OpEdNews:
OpEdNews Op Eds    H1'ed 7/3/13

NSA spying - another side of the story-- Data Privatized For Corporate Use

By       (Page 3 of 3 pages) Become a premium member to see this article and all articles as one long page.     (# of views)   24 comments
Author 78072
Message Martin Cohen
Become a Fan
  (4 fans)
The fact is, communications intelligence has long been an industrial scale activity targeting all foreign communications. If its roots are in the war against Nazi Germany, it was massively expanded in scope during the Cold War.

It was then, for example, that the big American telegraph companies -- Western Union, RCA and ITT -- agreed to provide the federal government with copies of all cables sent to or from the United States every day -- even though they knew it was illegal. "When the carriers computerized their operations in the 1960s, Operation Shamrock gained the ability to conduct keyword searches through each day's traffic. At that point, the NSA increasingly began to scan the nation's telegraphs against long lists of surveillance targets provided to the NSA by other security agencies -- including American anti-war and civil rights protesters, and even such groups as the Quakers" The program, codenamed "Operation Shamrock," only came to an end after it was incidentally revealed during investigations into various intelligence scandals in the 1970s.

Given this historical origin, it is hardly surprising that the most significant organisation using COMINT is undoubtedly that association of English-speaking nations led by the USA. (The United States being the First Party under the 1947 UKUSA agreement, with the United Kingdom, Canada, New Zealand and Australia, the Second Parties, supplying information. Actually, the UKUSA agreement was not acknowledged publicly until March 1999, when the Australian government confirmed that its Sigint organisation, Defence Signals Directorate (DSD) "does co-operate with counterpart signals intelligence organisations overseas under the UKUSA relationship".) Again, quoting the STOA report, these days though, the system is directed largely towards non-military targets. It operates by intercepting very large quantities of information and then siphoning out what is valuable, using artificial intelligence aids.

The National Security Agency (NSA) is the body which is responsible for counter-espionage and for protecting government and military communications and is also active in research and development. It covers the entire spectrum of military and civil information technologies.

From 1945 onwards in the United States the NSA and predecessor agencies systematically obtained cable traffic from the offices of the major cable companies. This activity was codenamed SHAMROCK. These activities remained unknown for 30 years, until enquiries were prompted by the Watergate affair. On 8 August 1975, NSA Director Lt General Lew Allen admitted to the Pike Committee of the US House of Representatives that :

"NSA systematically intercepts international communications, both voice and cable".

 He also admitted that "messages to and from American citizens have been picked up in the course of gathering foreign intelligence". US legislators considered that such operations might have been unconstitutional. During 1976, a Department of Justice team investigated possible criminal offences by NSA. Part of their report was released in 1980. It described how intelligence on US citizens:

"was obtained incidentally in the course of NSA's interception of aural and non-aural (e.g., telex) international communications and the receipt of GCHQ-acquired telex and ILC (International Leased Carrier) cable traffic (SHAMROCK)"

Fifteen years ago, it was known that the United States could if it chose direct space collection systems to intercept mobile communications signals and microwave city- to-city traffic anywhere on the planet.

The key component of the mass monitoring of civilian communications are local "Dictionary" computers, which store an extensive database on specified targets, including names, topics of interest, addresses, telephone numbers and other key data fields. This is exactly the way that Google manages to monitor the vast amount of text on the world wide web, and indeed the original communications intelligence system, Project P-415/ECHELON, made heavy use of NSA and GCHQ's global Internet-like communication network to enable remote intelligence customers to task computers at each collection site, and receive the results automatically. And the big tech companies have more than coincidental similarities with the US security apparatus.

But back to the United Kingdom. Here, GCHQ is tasked by the British government to intercept foreign communications "in the interests of the economic well-being of the United Kingdom ...in relation to the actions or intentions of persons outside the British Islands". Commercial interception is analysed by GCHQ's K Division while commercial and economic targets can be specified by the government's Overseas Economic Intelligence Committee, the Economic Staff of the Joint Intelligence Committee, the Treasury, or the Bank of England. According to a former senior JIC official, (quoted anonymously by the STOA report authors) the Comint take routinely includes "company plans, telexes, faxes, and transcribed phone calls".

So the spy story is scarcely news. But this time, let's hope it won't be swept under the carpet.

Next Page  1  |  2  |  3

 

Well Said 3   Valuable 3   Must Read 2  
Rate It | View Ratings

Martin Cohen Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Martin Cohen is a well-established author specializing in popular books in philosophy, social science and politics. His most recent projects include the UK edition of Philosophy for Dummies (Wiley June 2010); How to Live: Wise and not-so-wise (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEdNews Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

NSA spying - another side of the story-- Data Privatized For Corporate Use

NSA spying - the New York Times follows the money... again

What's not going on at Rio+20 - and why Aussie plonk is 'ecocider'

US spying on Europe - the gloves come off

Worldwide, safety regulators still see role as implementing nuclear industry plans

The New York Times dips a toe in British sleaze