Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Echelon; Worldwide Conversations Being Received (Transcript of 60 Minutes)
60 Minutes ^ | February 27, 2000 | Steve Kroft via Paul Wolf

Posted on 12/19/2005 8:49:50 AM PST by radar101

Television Broadcast February 27, 2000

If you made a phone call today or sent an e-mail to a friend, there's a good chance what you said or wrote was captured and screened by the country's largest intelligence agency. The top-secret Global Surveillance Network is called Echelon, and it's run by the National Security Agency and four English-speaking allies: Canada, Great Britain, Australia and New Zealand.

The mission is to eavesdrop on enemies of the state: foreign countries, terrorist groups and drug cartels. But in the process, Echelon's computers capture virtually every electronic conversation around the world.

How does it work, and what happens to all the information that's gathered? A lot of people have begun to ask that question, and some suspect that the information is being used for more than just catching bad guys.

(Footage of satellite; person talking on cell phone; fax machine; ATM being used; telephone pole and wires; radio towers)

KROFT: (Voiceover) We can't see them, but the air around us is filled with invisible electronic signals, everything from cell phone conversations to fax transmissions to ATM transfers. What most people don't realize is that virtually every signal radiated across the electromagnetic spectrum is being collected and analyzed.

How much of the world is covered by them?

Mr. MIKE FROST (Former Spy): The entire world, the whole planet--covers everything. Echelon covers everything that's radiated worldwide at any given instant.

KROFT: Every square inch is covered.

Mr. FROST: Every square inch is covered.

(Footage of Frost; listening post)

KROFT: (Voiceover) Mike Frost spent 20 years as a spy for the CSE, the Canadian equivalent of the National Security Agency, and he is the only high-ranking former intelligence agent to speak publicly about the Echelon program. Frost even showed us one of the installations where he says operators can listen in to just about anything.

Mr. FROST: Everything from--from data transfers to cell phones to portable phones to baby monitors to ATMs...

KROFT: Baby monitors?

Mr. FROST: Oh, yeah. Baby monitors give you a lot of intelligence.

(Footage of listening posts)

KROFT: (Voiceover) This listening post outside Ottawa is just part of a network of spy stations, which are hidden in the hills of West Virginia, in remote parts of Washington state, even in plain view among the sheep pastures of Europe.

This is Menwith Hill Station in the Yorkshire countryside of Northern England. Even though we're on British soil, Menwith Hill is an American base operated by the National Security Agency. It's believed to be the largest spy station in the world.

(Footage of Menwith Hill Station; aerial footage of NSA headquarters; supercomputers)

KROFT: (Voiceover) Inside each globe are huge dishes which intercept and download satellite communications from around the world. The information is then sent on to NSA headquarters at Fort Meade, Maryland, where acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.

Mr. FROST: Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as 'bomb' or 'terrorist' or 'blow up,' to telephone numbers or--or a person's name. And people are getting caught, and--and that's great.

(Footage of National Security Agency; Carlos the Jackal; two Libyans in court)

KROFT: (Voiceover) The National Security Agency won't talk about those successes or even confirm that a program called Echelon exists. But it's believed the international terrorist Carlos the Jackal was captured with the assistance of Echelon, and that it helped identify two Libyans the US believes blew up Pan-Am Flight 103.

Is it possible for people like you and I, innocent civilians, to be targeted by Echelon?

Mr. FROST: Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a--a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, 'Oh, Danny really bombed last night,' just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w--was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.

KROFT: This is not urban legend you're talking about. This actually happened?

Mr. FROST: Factual. Absolutely fact. No legend here.

(Vintage footage of Fonda; Spock; King; congressional hearing; the Capitol building)

KROFT: (Voiceover) Back in the 1970s, the NSA was caught red-handed spying on anti-war protesters like Jane Fonda and Dr. Benjamin Spock, and it turns out they had been recording the conversations of civil rights leaders like Martin Luther King in the 1960s. When Congress found out, it drafted strict, new laws prohibiting the NSA from spying on Americans, but today, there's enough renewed concern about potential abuses that Congress is revisiting the issue.

Representative BOB BARR (Republican, Georgia): (From C-SPAN) One such project known as Project Echelon engages in the interception of literally millions of communications involving United States citizens.

(Footage of Barr; NSA sign; Goss and Kroft)

KROFT: (Voiceover) But even members of Congress have trouble getting information about Echelon. Last year, the NSA refused to provide internal memoranda on the program to Porter Goss, the chairman of the House Intelligence Committee.

What exactly was it that you requested?

Representative PORTER GOSS (Chairman, House Intelligence Committee): Well, I can't get too specific about it, but there was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, 'Well, we don't think we need to share this information with the Oversight Committee.' And we said, 'Well, we're sorry about that. We do have the oversight, and you will share the information with us,' and they did.

(Footage of Goss and Kroft)

KROFT: (Voiceover) But only after Goss threatened to cut the NSA's budget. He still believes, though, that the NSA does not eavesdrop on innocent American citizens.

If the NSA has capabilities to screen enormous numbers of telephone calls, faxes, e-mails, whatnot, how do you filter out the American conversations, and how do you--how can you be sure that no one is listening to those conversations?

Rep. GOSS: We do have methods for that, and I am relatively sure that those procedures are working very well.

(Footage of Madsen; epic.org Web site; Amnesty International gathering; Greenpeace members in a boat; Princess Diana)

KROFT: (Voiceover) Others aren't so sure. Wayne Madsen works with a group called the Electronic Privacy Information Center, which is suing the NSA to get a copy of the documents that were finally turned over to Congressman Goss. Madsen, a former naval officer who used to work for the NSA, is concerned about reports that Echelon has listened in on groups like Amnesty International and Greenpeace. Last year, the NSA was forced to acknowledge that it had more than 1,000 pages of information on the late Princess Diana.

Mr. WAYNE MADSEN (Electronic Privacy Information Center): Princess Diana, in her campaign against land mines, of course, was completely at odds with US policy, so her activities were of tremendous interest to--to the US policy-makers, of course, and--and, therefore, to the National Security Agency eavesdroppers.

KROFT: Do you think the--the NSA only monitored her conversations that involved land mines?

Mr. MADSEN: Well, when NSA extends the big drift net out there, it's possible that they're picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?

(Footage of newspaper headlines; Menwith Hill Station)

KROFT: (Voiceover) In the early 1990s, some of Diana's personal conversations, as well as those of some others associated with the royal family, mysteriously appeared in the British tabloids. Could some of those conversations have been picked up by that US spy station in England?

Mr. MADSEN: (Voiceover) There's been some speculation that Menwith Hill may have been involved in the intercepts of those communications as--as well.

And how--how could that be legal? Well, British intelligence could say, 'Well, we didn't eavesdrop on members of the British royal family. These happened to be conducted by, you know, one of our strategic partners.' And, therefore, they would skirt the--skirt the British laws against intercepts of communications.

(Footage of National Security Agency sign)

KROFT: (Voiceover) The US admits it often shares intelligence with its allies, but never to get around the law.

Mr. FROST: Never, Steve, will governments admit that they can circumvent legislation by asking another country to do for them what they can't do for themselves. They will never admit that. But that sort of thing is so easy to do. It is so commonplace.

KROFT: Do you have any first-hand experience?

Mr. FROST: I do have first-hand experience where CSE did some dirty work for Margaret Thatcher when she was prime minister. She...

KROFT: What kind of dirty work?

Mr. FROST: Well, at the time, she had two ministers that she said, quote, "They weren't on side," unquote, and she wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers. The British Parliament now have total deniability. They didn't do anything. They know nothing about it. Of course they didn't do anything; we did it for them.

(Footage of Newsham and Kroft)

KROFT: (Voiceover) One of the few people to acknowledge that they have listened to conversations over the Echelon system is Margaret Newsham, who worked at Menwith Hill in England back in 1979. She had a top secret security clearance.

So who--you--you knew that conversations were being pulled off satellites.

Ms. MARGARET NEWSHAM: Yes. But to my knowledge, all it was going to be would be like Russian, Chinese or, y--you know, foreign.

(Footage of Newsham)

KROFT: (Voiceover) But soon, she says, she discovered it wasn't only the Russians and the Chinese who were the targets.

Ms. NEWSHAM: I walked into the office building and a friend said, 'Come over here and listen to--to this thing.' And--and he had headphones on, so I took the headphones and I listened to it, and--and I looked at him and I'm going, 'That's an American.' And he said, 'Well, yeah.'

KROFT: And it was definitely an American voice?

Ms. NEWSHAM: It was definitely an American voice, and it was a voice that was distinct. And I said, 'Well, who is that?' And he said it was Senator Strom Thurmond. And I go, 'What?'

KROFT: Do you think this kind of stuff goes on?

Mr. FROST: Oh, of course it goes on. Been going on for years. Of course it goes on.

KROFT: You mean the National Security Agency spying on politicians in...

Mr. FROST: Well, I--I...

KROFT: ...in the United States?

Mr. FROST: Sounds ludicrous, doesn't it? Sounds like the world of fiction. It's not; not the world of fiction. That's the way it works. I've been there. I was trained by you guys.

Rep. GOSS: Certainly possible that something like that could happen. The question is: What happened next?

KROFT: What do you mean?

Rep. GOSS: It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it's very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it's there. But what I can make sure is that it's not abused--the capability's not abused, and that's what we do.

KROFT: Much of what's known about the Echelon program comes not from enemies of the United States, but from its friends. Last year, the European Parliament, which meets here in Strasbourg, France, issued a report listing many of the Echelon's spy stations around the world and detailing their surveillance capabilities. The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.

(Footage of report; plane; report; Raytheon sign; Ford and Kroft)

KROFT: (Voiceover) The European Parliament report alleges that the NSA 'lifted all the faxes and phone calls' between the European aircraft manufacturer Airbus and Saudi Arabian Airlines, and that the information helped two American companies, Boeing and McDonnell Douglas, win a $ 6 billion contract. The report also alleges that the French company Thomson-CSF lost a $ 1.3 billion satellite deal to Raytheon the same way. Glen Ford is the member of the European Parliament who commissioned the report.

Mr. GLEN FORD (European Parliament Member): It's not the--if you want, the Echelon system that's the problem. It's how it's being used. Now, you know, if we're catching the bad guys, we're completely in favor of that, whether it's you catching the bad guys, us or anybody else. We don't like the bad guys. What we're concerned about is that some of the good guys in my constituency don't have jobs because US corporations got an inside track on--on some global deal.

(Footage of encryption machine; Clinton and several men walking; Ford)

KROFT: (Voiceover) Increasingly, European governments and corporations are turning to something called encryption, a system of scrambling phone, fax or e-mail transmissions so that the Echelon system won't be able to read them. The US is worried about the technology falling into the hands of terrorists or other enemies. The Clinton administration has been trying to persuade the Europeans to give law enforcement and intelligence agencies a key with which they can unlock the code in matters of national security. Glen Ford, the European parliamentarian, agrees it's a good idea, in principle.

Mr. FORD: However, if we are not assured that that is n--not going to be abused, then I'm afraid we may well take the view, 'Sorry, no.' In the United Kingdom, it's traditional for people to leave a key under the doormat if they want the neighbors to come in and--and do something in their house. Well, we're neighbors, and we're not going to leave the electronic key under the doormat if you're going to come in and steal the family silver.

KROFT: Y--you said that you think that this is basically a good idea, that we have to do this at some...

Mr. FROST: Oh, in a perfect world, we would not need the NSA, we would not need CSE. But, you know, we have to. We have to in the areas of terrorism, drug lords. We--we'd be lost without them. My concern is no accountability and nothing--no safety net in place for the innocent people that fall through the cracks. That's my concern.

KROFT: Accountability isn't the only issue that's of interest to Congress. There is growing concern within the intelligence community that encryption and the worldwide move to fiber-optic cables, which Echelon may not be able to penetrate, will erode the NSA's ability to gather the intelligence vital to national security. The agency is looking for more money to develop new technologies.


TOPICS: Constitution/Conservatism; Crime/Corruption; Foreign Affairs; Government; News/Current Events
KEYWORDS: 2000; 60minutes; eavesdropping; echelon; gwot; mikefrost; nsa; patriotleak; spying; transcript; x42
Who was President in 2000?
1 posted on 12/19/2005 8:49:51 AM PST by radar101
[ Post Reply | Private Reply | View Replies]

To: radar101
CLINTON!!!
2 posted on 12/19/2005 8:51:46 AM PST by Dallas59 (“You love life, while we love death"( Al-Qaeda & Democratic Party)
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101
Doesn't matter! 70s, 80s, 90s!

Bush's fault!

3 posted on 12/19/2005 8:53:11 AM PST by Young Werther
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101
Same one that ran intel operations in the US related to the OKC bombing. From a previous post:

And let's also not forget the satellite used to monitor events at Elohim City prior to the OKC bombing and COINTELPRO.

Truth is...the Government has been spying on citizens for decades. Only when it involves Bush are they outraged.

4 posted on 12/19/2005 8:53:29 AM PST by ravingnutter
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101
Why would anyone believe anything on 60 Minutes?

(Watch Pallywood for an example of their jounalistic integrity.)

ML/NJ

5 posted on 12/19/2005 8:54:39 AM PST by ml/nj
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101

ECHELON is about 80 miles from me in Washington State (Yakima). I did a lot of reading on this several years ago..While it is illegal for US installations to evesdrop on citizens, it is NOT illegal for Australia to intercept every email/telephone call from it's sister installation....so the way this works from the info I read is that the US installation can follow everything happening in Europe/Australia and the Australian setup can listen in on everything happening in America - then they just trade data...avoids having to get warrants, etc. to eavesdrop since it is being done in both cases by a foreign entity...


6 posted on 12/19/2005 8:55:29 AM PST by michaelbfree
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101

These are the two words I've been mentioning in response whenever any idiot lefty brings up this FAKE news story designed to blow the Iraqi election success out of the headlines. "Carnivore...Echelon..." and I tell them to go look it up.


7 posted on 12/19/2005 8:55:58 AM PST by Spiff ("They start yelling, 'Murderer!' 'Traitor!' They call me by name." - Gael Murphy, Code Pink leader)
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101

Duplicate.

http://www.freerepublic.com/focus/f-news/1543118/posts


8 posted on 12/19/2005 8:57:52 AM PST by Petruchio ( ... .--. .- -.-- / .- -. -.. / -. . ..- - . .-. / .. .-.. .-.. . --. .- .-.. / .- .-.. .. . -. ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: michaelbfree

The TRUTH.....the Truth.....it doesn't matter to the left..


9 posted on 12/19/2005 8:58:55 AM PST by Youngman442002
[ Post Reply | Private Reply | To 6 | View Replies]

To: radar101
There's a link to a 1999 Washpost article about Echelon here.

Strange thing though, not one mention of Clinton in the whole article. </sarcasm>
Seems it was all the NSA's fault back then.

10 posted on 12/19/2005 8:59:01 AM PST by michigander (The Constitution only guarantees the right to pursue happiness. You have to catch it yourself.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spiff

We used to talk about Eschelon and Carnivore in our computer science classes.

I'm beginning to think privacy is just an illusion. Live in a small town and everyone knows your business. If it might be embarrassing, you ought not do it.


11 posted on 12/19/2005 9:00:31 AM PST by TX Bluebonnet
[ Post Reply | Private Reply | To 7 | View Replies]

To: radar101
To process information on every single person, transaction or comunication would be impossible for any agency(ies) or country(ies)to collect and analyze. There is just too much of it going on to even monitor. If any one believes their comunication is being constantly monitored by an agency is either a criminal, terrorist, under ivestigation or a candidate for the rubber room.


12 posted on 12/19/2005 9:00:41 AM PST by darkwing104 (Let's get dangerous)
[ Post Reply | Private Reply | To 1 | View Replies]

To: darkwing104

When will Jimmy Carter attack the President over the use of 50 USC sec. 1802? I can't wait. EO 12139.


13 posted on 12/19/2005 9:02:57 AM PST by massgopguy (massgopguy)
[ Post Reply | Private Reply | To 12 | View Replies]

To: radar101

There's a huge difference between the technical ability to collect data and the functional ability to search through it and utilize it.

I think they give the gvt too much credit.


14 posted on 12/19/2005 9:03:45 AM PST by Pessimist
[ Post Reply | Private Reply | To 1 | View Replies]

To: darkwing104

Just because you're paranoid doesn't mean they aren't out to get you. ;-)


15 posted on 12/19/2005 9:04:22 AM PST by michigander (The Constitution only guarantees the right to pursue happiness. You have to catch it yourself.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: massgopguy
When will Jimmy Carter attack the President over the use of 50 USC sec. 1802? I can't wait. EO 12139.

I doubt it...He did it too.

It was Reagan that issued E.O. 12333


16 posted on 12/19/2005 9:05:02 AM PST by darkwing104 (Let's get dangerous)
[ Post Reply | Private Reply | To 13 | View Replies]

To: radar101

This is unmitigated garbage.

Speaking as a former member of the intelligence community, I can debunk at least some of this:

1. Eavesdropping on citizens is regulated by Intelligence Oversight and the Patriot Act. The circumstances under which a citizen can be surveilled are extremely limited, and even then tightly controlled.

Think for a moment - The folks at the NSA and FBI are people just like you and me. They're patriots for the most part, and while many people would do this sort of thing under the caveat "I was just following orders," a lot simply would not stand for it, and would break this wide open even under threat of arrest - and become the celebrated child of the mainstream media, complete with candlelight vigils outside Fort Leavenworth.

Massive spying on the U.S. public is *not* happening.

2. The U.S. has always been pretty tight-lipped with its allies, trusting them only as much as it has to. In countries like Canada or the U.K. where if this sort of surveillance became public knowledge the backlash would bring the government down, the U.S. just wouldn't risk it.

Members of Parliament (and Congress) are notoriously leaky with information like this.

Bottom line - It's not happening, there is no Big Brother, and this person is living in an alternate universe populated by aliens, conspiracy theories, and ghosts.

Common sense says the capability to do this surveillance is there, but says even more loudly that we aren't sharing that capability with ANY allies, and that it's use is governed in the strictest manner.


17 posted on 12/19/2005 9:20:19 AM PST by Heavyrunner (Socialize this.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: darkwing104

Of Course he did! Read the EO, and look at the implied emphasis on the word "any".


18 posted on 12/19/2005 9:36:55 AM PST by massgopguy (massgopguy)
[ Post Reply | Private Reply | To 16 | View Replies]

To: ravingnutter

Bump this and send a copy to D.irty U.nderpants (DU) before they asphyxiate on their frothy spittle about nazi Bush.


19 posted on 12/19/2005 9:37:38 AM PST by silverleaf (Fasten your seat belts- it's going to be a BUMPY ride.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Spiff
Thanks for reminding me about Carnivore. I'll add that to my list:

Echelon

Carnivore

COINTELPRO

Elohim City Satellite (OKC bombing)

As I said before, the FedGov has been doing this for decades, but now all of a sudden the MSM and Dems are feigning outrage.

20 posted on 12/19/2005 9:53:59 AM PST by ravingnutter
[ Post Reply | Private Reply | To 7 | View Replies]

To: radar101
OTHER FR THREAD on this same topic:

OH MY (60 Minutes from Feb. 2000)

21 posted on 12/19/2005 9:55:19 AM PST by NotJustAnotherPrettyFace
[ Post Reply | Private Reply | To 1 | View Replies]

To: radar101
The Clipper Chip

On April 16, 1993, the White House announced the Clipper Chip. ...

The Clipper Chip is a cryptographic device purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone would be used to encrypt data.

The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA), a super-secret military intelligence agency responsible for intercepting foreign government communications and breaking the codes that protect such transmissions. In 1987, Congress passed the Computer Security Act, a law intended to limit NSA's role in developing standards for the civilian communications system. In spite of that legislation, the agency has played a leading role in the Clipper initiative and other civilian security proposals, such as the Digital Signature Standard. NSA has classified the Skipjack algorithm on national security grounds, thus precluding independent evaluation of the system's strength.

Echelon (a partly hysterical review/analysis)

Strong encryption of information may offer resistance to Echelon. Encryption alters the information so that only persons with the decryption code can actually understand the information. Even if Echelon can intercept the message, the contents of the message would not be understood. In 1993, concern over this prompted the US Government to introduce the clipper chip which would provide strong communications encryption for law abiding citizens while preserving "the ability of federal, state and local law enforcement agencies to intercept lawfully the phone conversations of criminals"(16). The clipper chip didn't get off the ground - but there are regular attempts by the US to resist the development and exportation of strong encryption. One of the latest is the Federal Intrusion Detection Network which allows the FBI to "constantly track computer activities looking for indications of computer network intrusions and other illegal acts"(17). The use of strong encryption could be considered by law enforcement agencies as an indication of illegal acts.

Anyone besides me remember the whole PGP flap?

22 posted on 12/19/2005 5:54:38 PM PST by Alia
[ Post Reply | Private Reply | To 1 | View Replies]

To: Heavyrunner

BTTT on your post.


23 posted on 12/19/2005 5:55:17 PM PST by Alia
[ Post Reply | Private Reply | To 17 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson