How does the ECHELON surveillance system works

How does the ECHELON surveillance system works?

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInShare on Reddit

The ECHELON surveillance system is a purported intelligence program involving the development and operation of a top-secret global surveillance network by five signatories of the UKUSA Agreement—Australia, Canada, New Zealand, the United Kingdom, and the United States. It was publicly disclosed in 1988 by investigative journalist Duncan Campbell and later expositions from journalists, government officials, and even the European Parliament seemingly confirmed its existence.

The early operational structure of the ECHELON program

In his 1998 article, Campbell provided an overview of how the early ECHELON surveillance system works during the Second World War and the Cold War. Under the UKUSA Agreement, the signatory countries were given the task to monitor transmissions and coordinate signals intelligence in assigned regions of the world.

The U.S. National Security Agency initially supervised the entire program. It was also responsible for covering the transmissions in Soviet Union and most of the Americas. On the other hand, the Global Communications Headquarters of the British intelligence was responsible for monitoring and coordination in Europe, Africa, and other parts of the Soviet Union. Another listening network in Australia coordinated the monitoring of transmissions in the South Pacific and Southeast Asia.

Each participating countries operates several computer centres. Using supercomputers that run a particular software, the intercepted transmissions are subjected under a keyword search. These keywords include single words, phrases, and names, among others that are related to military activities, drug trafficking and other crimes, trade of embargoed goods and other dual-use technology, and economic activities.

Current technological considerations for the ECHELON program

The 2001 report based on the investigation of the European Parliament argued that long-distance and technology-aided communications are possible to intercept as long as the interceptor can access the involved medium.

According to the report, a long-distance technology-aided communication uses any of the following medium: air for sound waves, light for fibre optic transmission, electric current used in telegraph and telephone, and electromagnetic wave for radio communications.

Both the 1996 exposition made by journalist Nick Hacker and the 1998 report from the European Parliament that was discussed further in the 2001 report of the EP investigation mentioned that wiretapping and the use of receiver satellites are critical in intercepting communications from the aforementioned mediums.

Interception using the ECHELON surveillance system works by wiretapping of telecommunication lines or cables placed under the sea or by positioning listening or satellites in strategic locations across the globe.

Of course, wiretapping has become more impossible due to the advances in digital communication technology. The growing complexity of communication lines and network gateways across the globe have also made wiretapping an outdated technology.

For instance, note that all global Internet communications were once routed in the U.S. before. This allowed intelligence organisations to easily intercept a substantial portion of Internet communications transpiring in Europe. Routing now transpires in different regions of the world. This has rendered wiretapping inefficient and ineffective.

Listening satellites now fill the void left by wiretapping. In 1999, the former director of the Defence Signals Directorate of Australia revealed that UKUSA signatories use satellites positioned over the Indian and Pacific oceans to intercept electronic communications. This system has become more feasible because most of the long-distance communications now transpires using satellites.

Using the satellites, the system allegedly works like a giant scanner that hovers satellite communications from ground stations across the globe. Upon interception, the communications are fed into supercomputers that contain the software for searching keywords and flagging suspected messages.

Summary: How does the ECHELON surveillance system works?

The ECHELON surveillance system is an intelligence program developed under the UKUSA agreement. Central to the objective of this program is the development and operation of a top-secret global surveillance network by Australia, Canada, New Zealand, the United Kingdom, and the United States.

Reports and expositions revealed that the ECHELON surveillance system works by intercepting communications or transmissions using relevant technologies. For example earlier iteration to the ECHELON program relied on wiretapping technologies but complexities in modern telecommunication networks have made satellite technologies a more feasible alternatives.

With regard to the actual operational framework of the ECHELON program, intelligence organisations or agencies from the five UKUSA countries intercept transmissions using systems assembled and operated in different parts of the world. These organisations share the intercepted transmissions with one another and continuously subject them under a keyword search.

The keyword search references the ECHELON dictionaries to find suspicious words. In other words, after intercepting the transmissions, supercomputers perform a search and flag up any messages containing the suspicious keywords. The flagged transcriptions are recorded and transcribed for further analysis.

Further details of the result of the 2000 European Parliament investigation are in the document “On the Existence of a Global System for the Interception of Private and Commercial Communications” authored by Gerhard Schmid and published in 2001. Further details of the report of Campbell are in the article “Somebody’s Listening” published in 1988 in the New Statesman.

Details of the exposition of Hager are in the book “Secret Power, New Zealand’s Role in the International Spy Network” published in 1996 by Craig Potton Publishing. Further details of the European Parliament report are in the article “An Appraisal of Technologies of Political Control” published in 1998. Details of the DSD revelation are in the article “Britain and US Spy on World” authored by Duncan Campbell and Honigsbaum and published in 1999 by The Guardian.

RELATED POSTS