Welcome to

- Amsterdam - New York - Santa Cruz - New Zealand -
News, Views and Actions
Visit us at http://members.tripod.com/~ellis_smith/ameri-advocate.html
            *  ICQ# 22499125   *  AOL-IM - SMITHORG *

Front Page or Contents

Techno Warfare/MACRO-USGOV
Espionage Operations

Techno Warfare/ MACRO-USGOV Espionage Operations - Page 1
 Techno Warfare/MACRO-USGOV Espionage Operations - Page 2
 Techno Warfare/MACRO-USGOV Espionage Operations - Page 3





Privacy and Free Speech take a back seat

The following series of articles, posts and commentaries are in reverse order, from the latest news to the origin of our following this on going tale of intrigue, espionage and the trampling of civil liberties on a global scale. This is one story that the Ameri-Advocate has not only pursued from its discovery in mid 1998 but we have also unfortunately been victims of this electronic conflict along with, now millions of others. If you are new to this tale then please proceed to the bottom of this page and work your way up. Once caught up I'm sure your going to want to come back often to catch the latest on this series.

A late breaking item,... for a complete breakdown on these technologies, the history and the agencies behind them, please click over to "Interception Tech 2000" If you thought we were joking all this time I promise you, after you read this site you'll realize exactly far this has gone and how long its been in the making.

New York Times

May 27, 1999
Lawmakers Raise Questions About International Spy Network

An international surveillance network established by the National Security Agency and British intelligence services has come under scrutiny in recent weeks, as lawmakers in the United States question whether the network, known as Echelon, could be used to monitor American citizens.

Last week, the House Committee on Intelligence requested that the National Security Agency and the Central Intelligence Agency provide a detailed report to Congress explaining what legal standards they use to monitor the conversations, transmissions and activities of American citizens.

The request is part of an amendment to the annual intelligence budget bill, the Intelligence Reauthorization Act. It was proposed by Bob Barr, a Georgia Republican and was supported by the chairman of the House Intelligence Committee, Porter Goss, a Florida Republican. The amendment was passed by the House on May 13 and will now go before the Senate.

Barr, a former CIA analyst, is part of a growing contingent in the United States, Europe and Australia alarmed by the existence of Echelon, a computer system that monitors millions of e-mail, fax, telex and phone messages sent over satellite-based communications systems as well as terrestrial-based data communications. The system was established under what is known as the
"UKUSA Agreement" after World War II and includes the security agencies of the United States, Britain, Canada, Australia and New Zealand.

Although Echelon was originally set up as an international spy network, lawmakers are concerned that it could be used to eavesdrop on American citizens.

"I am concerned there are not sufficient legal mechanisms in place to protect our private information from unauthorized government eavesdropping through such mechanisms as Project Echelon," Barr said in an interview on Tuesday.

The finished report will outline the legal bases and other criteria used by United States intelligence agencies when assessing potential wiretap targets. It will be submitted to the House and made available to the public.

"If the agencies feel unable to provide a full account to the public, then a second classified report will be provided to the House Committee on Intelligence," Barr said. "This is to stop the agencies hiding behind a cloak of secrecy."

Judith Emmel, chief of public affairs for the NSA, declined to comment about the UKUSA Agreement but said the agency was committed to responding to all information requests covered by Barr's amendment. "The NSA's Office of General Counsel works hard to ensure that all Agency activities are conducted in accordance with the highest constitutional, legal and ethical standards," she said.

Until last Sunday, no government or intelligence agency from the member states had openly admitted to the existence of the UKUSA Agreement or Echelon. However, on a television program broadcast on Sunday in Australia, the director of Australia's Defense Signals Directorate acknowledged existence of the agreement. The official, Martin Brady, declined to be
interviewed for the "Sunday Program," but provided a statement for its special on Echelon. "DSD does cooperate with counterpart signals intelligence organizations overseas under the UKUSA relationship," the statement said.


Related Articles
European Parliament Debates Wiretap Proposal
(May 7, 1999)
Dutch Law Goes Beyond Enabling Wiretapping to Make It a Requirement
(April 14, 1998)

European Study Paints a Chilling Portrait of Technology's Uses
(February 24, 1998)


Meanwhile, European Parliament officials have also expressed concern about the use of Echelon to gather economic intelligence for participating nations. Last October, the spying system came to the attention of the Parliament during a debate on Europe's intelligence relationship with the United States. At that time, the Parliament decided it needed more
information about Echelon and asked its Science and Technology Options Assessment Panel to commission a report.

The report, entitled "Development of Surveillance Technology and Risk of Abuse of Economic Information", was published on May 10 and provides a detailed account of Echelon and other intelligence monitoring systems.

According to the report, Echelon is just one of the many code names for the monitoring system, which consists of satellite interception stations in participating countries. The stations collectively monitor millions of voice and data messages each day. These messages are then scanned and checked against certain key criteria held in a computer system called the
"Dictionary." In the case of voice communications, the criteria could include a suspected criminal's telephone number; with respect to data communications, the messages might be scanned for certain keywords, like "bomb" or "drugs." The report also alleges that Echelon is capable of monitoring terrestrial Internet traffic through interception nodes placed on
deep-sea communications cables.

While few dispute the necessity of a system like Echelon to apprehend foreign spies, drug traffickers and terrorists, many are concerned that the system could be abused to collect economic and political information.

"The recent revelations about China's spying activities in the U.S. demonstrates that there is a clear need for electronic monitoring capabilities," said Patrick Poole, a lecturer in government and economics at Bannock Burn College in Franklin, Tenn., who compiled a report on Echelon
for the Free Congress Foundation. "But those capabilities can be abused for political or economic purposes so we need to ensure that there is some sort of legislative control over these systems."

On the "Sunday Program" special on Echelon, Mike Frost, a former employee of Canada's Communications Security Establishment, said that Britain's intelligence agency requested that the CSE monitor the communications of British government officials in the late 1980s. Under British law, the intelligence agency is prohibited from monitoring its own government.
Frost also said that since the cold war is over, the "the focus now is towards
economic intelligence."

Still, Echelon has been shrouded in such secrecy that its very existence has been difficult to prove. Barr's amendment aims to change that. "If this report reveals that information about American citizens is being collected without legal authorization, the intelligence community will
have some serious explaining to do," Barr said.


----- Original Message -----
From: Perry E. Metzger <perry@piermont.com
June 05, 1999 6:30 AM
NSA and Congress at odds over Echelon

Federal Computer Week has an interesting article about the NSA resisting Congressional oversight about Echelon:


Congress, NSA butt heads over Echelon

BY DANIEL VERTON (dan_verton@fcw.com)

Congress has squared off with the National Security Agency over a top-secret U.S. global electronic surveillance program, requesting top intelligence officials to report on the legal standards used to prevent privacy abuses against U.S. citizens.

According to an amendment to the fiscal 2000 Intelligence Authorization Act proposed last month by Sen. Bob Barr (R-Ga.), the director of Central Intelligence, the director of NSA and the attorney general must submit a report within 60 days of the bill becoming law that outlines
the legal standards being employed to safeguard the privacy of American citizens against Project Echelon.

Echelon is NSA's Cold War-vintage global spying system, which consists of a worldwide network of clandestine listening posts capable of intercepting electronic communications such as e-mail, telephone conversations, faxes, satellite transmissions, microwave links and fiber-optic communications traffic. However, the European Union last year raised concerns that the system may be regularly violating the privacy of law-abiding citizens [FCW, Nov. 17, 1998].

However, NSA, the super secret spy agency known best for its worldwide eavesdropping capabilities, for the first time in the history of the House Permanent Select Committee on Intelligence refused to hand over documents on the Echelon program, claiming attorney/client privilege.

Congress is "concerned about the privacy rights of American citizens and whether or not there are constitutional safeguards being circumvented by the manner in which the intelligence agencies are intercepting and/or receiving international communications...from foreign nations that
would otherwise be prohibited by...the limitations on the collection of domestic intelligence," Barr said. "This very straightforward amendment...will help guarantee the privacy rights of American citizens [and] will protect the oversight responsibilities of the Congress which
are now under assault" by the intelligence community.

Calling NSA's argument of attorney/client privilege "unpersuasive and dubious," committee chairman Rep. Peter J. Goss (R-Fla.) said the ability of the intelligence community to deny access to documents on intelligence programs could "seriously hobble the legislative oversight
process" provided for by the Constitution and would "result in the envelopment of the executive branch in a cloak of secrecy."

Copyright 1999 FCW Government Technology Group


June 6,1999

Germany has apparently woken up to the slight of hand activities of the US DOJ activities regarding encryption and electronic interdiction. (ILETS/DIRT) What is absolutely amazing is under the pretense of chasing gangsters and terrorist's all these countries never thought about the simple fact that they're all gangs of one form or another and that with a little gratuity, corporate activities could just as easily be included in the monitoring routines. Its just business... like any other.


----- Original Message -----

From: Putrefied Cow <waste@zor.hut.fi
June 04, 1999 10:20 AM
Germany Endorses Strong Crypto
Wired News Report

In an apparent response to corporate spying allegedly conducted in Europe by the United States, Germany is encouraging citizens and businesses to use strong cryptography.

"[Germany] considers the application of secure encryption to be a crucial requirement for citizens' privacy, for the development of electronic commerce, and for the protection of business secrets," reads a translated version of a policy framework document released

Wednesday by Germany's Federal Department of Business and Technology (BMWI).

"The federal government will therefore actively support the distribution of secure encryption. This includes in particular increasing the security consciousness of citizens, business and administration.

Australia recently became the first nation to admit it participates in Echelon, a previously secret global surveillance network capable of intercepting electronic communications anywhere in the world.

Echelon is said to be principally operated by the United States' National Security Agency and its UK equivalent, the Government Communications Headquarters. In addition to Australia, the system relies on cooperation with other signals-intelligence agencies in Canada and

New Zealand.

Earlier this month, UK investigative journalist Duncan Campbell submitted Interception Capabilities 2000, his report on Echelon, to the European Parliament's Science and Technology Options Assessment Panel.

Campbell had been asked to investigate the system in the wake of charges made last year in the European Parliament that Echelon was being used to funnel European government and industry secrets into US hands. In the wake of the report, the Australian government confirmed the Echelon alliance to media in follow-up interviews.

Though Wednesday's German government statement does not mention Echelon, the document alludes to the specter of industrial espionage.

"For reasons of national security, and the security of business and society, the federal government considers the ability of German manufacturers to develop and manufacture secure and efficient encryption products indispensable," the statement said. The government added that it would take additional measures to strengthen its domestic crypto software industry.

The policy also cautioned that while encryption may be used to criminal ends, the need to protect electronic commerce overrides any such concerns. The department said it would prepare and release a report on the criminal uses of cryptography within two years.

The US government restricts the export of strong crypto on the grounds that it might be used by terrorists and hostile nations to conceal communications.

- Posted by: Putrefied Cow <waste@zor.hut.fi

27 May 1999 Source: Hardcopy Business Week, May 31, 1999, pp.110-111.


Echelon monitors phones, E-mail, and radio signals

You think the Internet brings grave new threats to privacy? Then you probably don't know about Echelon. Run by the super secret National Security Agency, it's the grand- daddy of all snooping operations.

Business and political leaders are waking up to the alarming potential of this hush-hush system. A combination of spy satellites and sensitive listening stations, it eavesdrops on just about every electronic communication that crosses a national border ; phone calls, faxes, telexes, and E-mail ;plus all radio signals, including short-wave, airline, and maritime frequencies. Echelon's globe-straddling system also listens in on most long distance telecom traffic within countries. Ditto for local cell-phone calls.

Indeed, if a phone call or message travels via satellite or microwave relay during any part of its journey, it probably gets picked up by Echelon. So the lion's share of all telecommunications traffic is bugged because even undersea phone cables and fiberoptic terrestrial systems often have microwave links somewhere in the loop. "Americans should know that every time they place an international call, the NSA is listening," says John E. Pike, a military analyst at the Federation of American Scientists in Washington. "Just get used to the fact ;Big Brother is listening."

In Europe, Big Brother may soon get a second set of ears. The European Parliament is working on a junior version of Echelon. A resolution outlining the technical standards for tapping such new tech systems as the Internet was approved on May 7.

Encryption is no guarantee of privacy either. The NSA, which is bigger than the Central Intelligence Agency and runs Echelon from its headquarters at Ft. Meade, Md., has little trouble unscrambling messages encoded with most commercial encryption software. With a little more time, NSA can probably break "crypto" schemes with so- called keys almost 1,000 bits long, says Lisa S. Dean, vice-president for technology at the Free Congress Research & Education Foundation, a conservative think tank in Washington. "That's why 1,028 bits is used by most organizations that are concerned about confidentiality."

If it's any consolation, the vast bulk of all communications are never heard or seen by people. Echelon's chief task is sifting through civilian telecom traffic for clues about terrorist plots, drug-smuggling cartels, political unrest, and other intelligence requested by the Pentagon, government strategists, and law-enforcement agencies. Supercomputers screen the so-called intercepts for key words related to such matters. If the computers don't spot anything suspicious, the tapes get erased after a month or so.


Still, like any technological tool, Echelon is subject to political abuses&and there have been some. During the Reagan Administration, Echelon intercepted phone calls by Michael Barnes, then a Democratic Congressman from Maryland, to Nicaraguan officials, and transcripts were leaked to the press. Echelon can also backfire: On two occasions, Canadian spooks who collaborate with the NSA used Echelon to pick up information on pending U. S.China grain deals and steal the business with lower prices.

Echelon has been operating with little fanfare for decades. It springs from a secret pact signed in 1948 by the U. S., Australia, Britain, Canada, and New Zealand&the countries running Echelon's main listening posts (map). Then, last year, the system was hauled into the glare of public scrutiny by a study prepared for the European Parliament by Omega Foundation, a British market researcher. Europeans were enraged by its finding that "within Europe, all Email, telephone, and fax communications are routinely intercepted" by the NSA. "Unlike many of the electronic spy systems developed during the Cold War," the report noted, "Echelon is designed for primarily non-military targets: governments, organizations, and businesses in virtually every country."

From: "d.linen" linen@flash.net

...snip...@niehs.nih.gov 27 May 99 8:46 am


An international surveillance network established by the National
Security Agency and British intelligence services has come under scrutiny in
recent weeks, as lawmakers in the United States question whether the network,
known as Echelon, could be used to monitor American citizens. Last week, the House
Committee on Intelligence requested that the National
Security Agency and the Central Intelligence Agency provide a detailed
report to Congress explaining what legal standards they use to monitor
the conversations, transmissions and activities of American citizens.


Until last Sunday, no government or intelligence agency from the member
states had openly admitted to the existence of the UKUSA Agreement or
Echelon. However, on a television program broadcast on Sunday in
Australia, the director of Australia's Defense Signals Directorate
acknowledged the existence of the agreement. The official, Martin
Brady, declined to be interviewed for the "Sunday Program," but provided a
statement for its special on Echelon. "DSD does cooperate with
counterpart signals intelligence organizations overseas under the UKUSA
relationship," the statement said.


According to the report, Echelon is just one of the many code names for
the monitoring system, which consists of satellite interception stations
in participating countries. The stations collectively monitor millions
of voice and data messages each day. These messages are then scanned and
checked against certain key criteria held in a computer system called the "Dictionary."
In the case of voice communications, the criteria couldinclude a suspected criminal's
telephone number; with respect to data
communications, the messages might be scanned for certain keywords,
like "bomb" or "drugs." The report also alleges that Echelon is capable of
monitoring terrestrial Internet traffic through interception nodes
placed on deep-sea communications cables.




by Ellis Smith

Alpha testing to Beta Testing - What better way to test electronic warfare technologies then an intellectually and technologically superior public control group?

Yesterday afternoon while going through email I noted a very unusual note generated by a gentleman to a nondescript post. Rather then reply, the note was converted to an attachment, then re-sent to a very large distribution lis. The attachment with a three word reply.

(This is not to infer the gentleman himself was the responsible party. As anyone involved in softwar's knows, nine times out of ten the originating parties had no clue their email was being altered or tampered with in process of distributing it.)

It struck me as very odd as to what purpose one would one go to this effort in order to forward an attachment of a prior email for a three word response. Something here did not compute. As many might already realize, virus's and trojan horses can only be successfully transmitted by either hypertext links and/or email attachments.

I confronted the gentleman on the list, not directly but indirectly, asking as to why such an effort to convert to an attachment for such a minuscule response? He was not even aware it had been converted and according to the list moderator not everyone received it as being an attachment. This is even odder.

Within five minutes of my email being successfully distributed to those online I was knocked offline as was one of our own subscribers in Texas which is very far away from California or New York/New Jersey.

As I was about to pick up the phone to contact THE PHONE COMPANY to inquire as to why I was no longer able to connect, when our subscriber called me directly stating "I've just been knocked offline and I cannot get back on". She has relentlessly been pursued by the hackers we've focused on for the past year and so she called to ask my advice. Needless to say, I told her her timing was impeccable as I too was unable to get online having been unexpectedly disconnected.

I spent the next two and one half hours working my way thru *THE PHONE COMPANY's Corp. structure. It seems that even "THE PHONE COMPANY was unable by phone to reach it's own PHONE COMPANY's Internet Services Division.. After 7 attempts and 2 hours I finally got thru. It seemed that the entire North Jersey servers had just had their password systems crashed and no one could log in.

North Jersey is the most densely populated area in the nation.

THE PHONE COMPANY had only just discovered the "outage" 20 minutes before I "worked" my way through their corporate structure even though the network had actually been down 2 hours. Apparently no one could get through in order to inform them their system was down.

Texas and NJ do not share a common carrier. The coincidence of the email, our outages and THE PHONE COMPANY suddenly crashing simultaneous defies statistical probability. Not to mention that less then four months ago when our system was destroyed, THE PHONE COMPANY was hacked at that time also (according to Network Engineers who will not be quoted for fear of their jobs or lives) and was shut down completely for many , many hours.

Now, suddenly in light of this massive outage; this "FBI STORY" comes out via MSNBC.

(Hackers Vrs. FBI - MSNBC)

Yeah right.

Lets try my story.

In June of 1998 ILETS witnessed the software being displayed at a vendor convention in NYC and purchases it.

Mid July unknown military/intelligence cost centers contracted "a known Internet corporate executive of wealth, resources and whom they had purchased and set up into his previous position of wealth and fame". They gave him the military contract to devise and test this product into a workable and verifiable weapon.

They utilized data centers around the globe to Alpha test their product and tailor it to defeat their target test group and succeeded by compromising the individual test group they determined would be the greatest challenge. The UFO community's demographic's are such that the average user is intellectually and technologically adept if not superior and they possess a foundation of belief that assumes a conspiracy is waged against them. Meaning in essence, they are already prepared defensively. Once this community was compromised they proceeded to compromise A MAJOR CREDIT CARD/BANK COMPANY by initiating falsified credit debits repeatedly from an account in Florida to a retail site in North Dakota which just happens to be the legal Corporate headquarters of the same bank.

They then defeated A MAJOR COMMUNICATIONS HUB NETWORK SOURCE, namely THE PHONE COMPANY; by knocking them completely offline for hours.

After the results were proven in ALPHA testing, the reports were generated and provided to the Pentagon. During this time war erupted in the Balkans. When Clinton was presented with the choices available and when the aerial bombing was proving to not be producing the results expected; this new technology was brought to his attention.

Last week Clinton signed an executive order allowing this technology to be put into action and approved its use in acquiring Serbian funds clandestinely and to disrupt their communications systems. Within two days of the signing of this Executive Order, Beta testing began and hence THE PHONE COMPANY was hit again, as were the same members of their test Alpha group and I'd wager the BANK and CREDIT CARD customers were as well. This all being part of the final validation process before they go live in Europe.

How many people lost tons of money for the nonsense that ensued when THE PHONE COMPANY password server was raided and rendered incapacitated?

How many credit card holders are going to be over charged by $50.00 transaction across the board as they test their capabilities to usurp their Banking systems overseas?

And if anyone wonders why the US MILITARY and the rest of these slimy b******* read my site, it must certainly and primarily be DIRT, ILETS and its Domestic Testing.

Amazing what kind of attention a guy in a bathrobe can get eh?


From: "Ellis Smith" smithorg@bellatlantic.net

Nice to know our tax dollars are being used so effectively with a limited
budget. How come they can triple their work efforts in domestic
espionage but not manage to do so with say food stamps or rental
assistance with the same budgets?


Forwarded from NewsScan Daily:
NewsScan Daily, 21 May 1999 ("Above The Fold")

NewsScan Daily is a summary of significant information technology news,
written by John Gehl & Suzanne Douglas. It is a FREE service of
NewsScan.com. Visit us at http://www.NewsScan.com/.



The number of wiretaps placed by state and federal law enforcement officials on cell phones, pagers, e-mail and other telecommunications devices nearly tripled last year, and for the first time wiretaps on cell phones and pagers outnumbered those on conventional telephones. About three-quarters of the 1,329 wiretaps authorized were related to drug cases, according to a report issued by the Administrative Office of the U.S. Courts. Wiretaps on wireless communications devices -- cell phones and pagers -- more than doubled, from 206 in 1997 to 576 last year, and for the first time, five e-mail wiretaps were implemented. (USA Today 21 May 99) http://www.usatoday.com/life/cyber/tech/ctf213.htm


The U.K. House of Commons Select Trade and Industry Committee has released a report criticizing the European Union's Enfopol resolution, which would force Internet service providers and telecommunications carriers to establish an infrastructure that would enable law enforcement agencies to intercept Internet traffic. Calling the plan unjustified and
unfeasible, committee chairman Martin O'Neill said, "We felt the civil-liberties
arguments outweighed the security arrangements. If (the intelligence services) could justify what they were doing in terms of results, people would want to do it. Otherwise, it's a leap in the dark." O'Neill also noted that such restrictions could damage the climate for e-commerce in Great Britain, and Europe in general.

(TechWeb 21 May 99)

- Posted by: Putrefied Cow <waste@zor.hut.fi

International Conspiracy Threatens Internet Privacy


Sunday, May 23, 1999

This is purely a personal opinion and should not be held as reason for bombing, espionage, insertion of radioactive material or legal entanglements of the ridiculous kind. This is an expression of free speech and personal interpretation that are guarantee under the constitution and should any retribution be inherited from this expression we are prepared with counsel, legally to respond.

Now, having said this...

According to ABC news this evening Data Warfare permission has been authorized by President Clinton. This is a surprise? Frankly no.

The UFO community having endured close to a year of bizarre hacking and viral attacks should not find it unusual that the Dept. of State has finally been given clearance to perform the tasks legally and in a mode of direct warfare that they've already more then tested and perfected on this nations own population for the past year.

Numerous reports and occurrence have transpired over the past

year that although leave no definitive proof nor verifiable audit trail that this is the case; still, any idiot with half a consciousness can follow with the slightest amount of grey matter.

It began with the release of the "top five groups to watch for the millennia". The usual terrorist cells, drug dealers, communist infiltrators, right wing armed white supremacist extremist groups and UFO buff's? What was wrong with this picture?

What makes the UFO investigative community unique is the demographic's. Most are technically trained and disciplined, are relatively well off economically, are dedicated and have a premise of paranoia as their base line of investigative endeavors. What better target group to test the most invasive and technologically complex projects initiated to date then on a target group who are already expecting technological invasion, are technologically savvy to the state of the art in data interception and defensive arts and who are most likely to not raise a public flag should things go awry?

What is fascinating is that true to form in the US ability to devise superior technology their efforts were fast and perfected easily, taking under a year to quantify their ability and project viability. They compromised *A Major Bank* Visa, *A Phone Company*, hundreds of individual labs an personal computers and God only knows how many commercial interest's in they're qualification routines.

Now, with this completed, President Clinton signs off on allow this project to go live in a "war zone" to go after Milosovech's and Serbia's Bank Accounts.

Big Surprise. Its nice to know that somehow we played a BS bit part in the overall strategy to deprive genocidal maniac's the ability to wage war on innocent civilians. However I will reiterate, that I would appreciate NATO continuing with the effort on the other criminal states in the world, namely South Dakota, Minnesota and Arizona who are also actively engaged in their own genocidal war on innocent civilians.

Since NATO and the US feel that hypocrisy is somehow explainable, having endured their testing at great personal monetary loss I might add, makes the effort far less noble and far more nauseating.




Ellis Smith" smithorg@bellatlantic.net

Once again, thanks to the Europeans, we're receiving even more info on the US's war on the electronic community and civilians as a whole, complements of ILETS and its associated membership and strategic alliances.


-----Original Message-----

From: Traumatic Dog waste@zor.hut.fi

Spying on the Spies
by Niall McKay

The National Security Agency has its ear to the world, but doesn't listen to everyone at once. That was one conclusion of a new report, Interception Capabilities 2000, accepted late last week by the European Parliament's Science and Technology Options Assessment Panel (STOA).

The panel commissioned Duncan Campbell, a British investigative reporter, to prepare a report on Echelon, the US-led satellite surveillance network. "I have no objection to these systems monitoring serious criminals and terrorists," said Glyn Ford, a British Labour Party member of parliament and a committee member of STOA. "But what is missing here is accountability, clear guidelines as to who they can listen to, and in what circumstances these laws apply."

Campbell was asked to investigate the system in the wake of charges made last year in the European Parliament that Echelon was being used to funnel European government and industry secrets into US hands. "What is new and important about this report is that it contains the first ever documentary evidence of the Echelon system," said Campbell.

Campbell obtained the document from a source at Menwith Hill, the principal NSA communications monitoring station, located near Harrogate in northern England. The report details how intelligence agencies intercept Internet traffic and digital communications, and includes screen shots of traffic analysis from NSA computer systems.

Interception Capabilities 2000 also provides an account of a previously unknown, secret international organization led by the FBI. According to Campbell, the "secret" organization, called ILETS (International Law Enforcement Telecommunications Seminar), is working on building backdoor wiretap capabilities into all forms of modern communications, including satellite communications systems.

"[The report] is undoubtedly the most comprehensive look at Echelon to date because of its attention to detail -- [and] the NSA's use of technology," said John Young, a privacy activist in New York. Although the United States has never officially acknowledged Echelon's existence, dozens of investigative reports over the past decade have revealed a maze-like system that can intercept telephone, data, cellular, fax, and email transmissions sent anywhere in the world. Previously, Echelon computers were thought to be able to scan millions of telephone lines and faxes for keywords such as "bomb" and "terrorist." But Campbell's report maintains that the technologies to perform such a global dragnet do not exist.

Instead, Campbell said that the system targets the communications networks of known diplomats, criminals, and industrialists of interest to the intelligence community. The report charges that popular software programs such as Lotus Notes and Web browsers include a "backdoor," through which the NSA can gain access to an individual's personal information.

Citing a November 1997 story in the Swedish newspaper, Svenska Dagbladet, the report said that "Lotus built in an NSA 'help information' trapdoor to its Notes system, as the Swedish government discovered to its embarrassment." The report goes on to describe a feature called a "work factor reduction field" that is built into Notes and incorporated into all email sent by non-US users of the system. The feature reportedly broadcasts 24 of the 64 bits of the key used for each communication, and relies on a public key that can only be read by the NSA.

Lotus could not be reached for comment.

The new report emerges as politicians on both sides of the Atlantic are growing increasingly concerned about Echelon and its capabilities. "I believe that it's time that there is some congressional scrutiny of the Echelon project and I am examining a way to do that," said Representative Bob Barr (R-Georgia). "I understand the need for secrecy -- I was with the CIA myself -- but Echelon has raised some questions about fundamental policy and constitutional rights."

Barr is concerned that the NSA is using its Echelon partners to help it sidestep laws that forbid the US government from spying on its own people. So far, there has been very little scrutiny of spy systems in the United States, according to Patrick Poole, a privacy advocate and lecturer in government and economics at Bannock Burn College in Franklin,Tennessee. "The only significant examination of spy systems in the United States was the Church Report, which was prompted by Watergate in the early '70s," said Poole. "I hope that Europe's interest in the Echelon system will spark some new debate in the US."

Echelon is believed to be principally operated by the NSA and its British counterpart, the Government Communications Headquarters.

The system also reportedly relies on agreements with similar agencies in other countries, including Canada's Communications Security Establishment, Australia's Defense Signals Directorate, and New Zealand's Government Communications Security Bureau.



: Codex Data Systems http://www.thecodex.com/

Want to know they're saying about D.I.R.T.?
Military and Government Agency Access ONLY
Certain Information is Restricted and Closed To Unauthorized Use.

All accesses verified.

Access to restricted area is granted upon receipt of your
official request on agency letterhead.

Call 914-627-0011 for details or fax Official Agency letterhead
to: 914-627-0211

Technical Specifications
Sale of this technology is restricted to military, government
and law enforcement agencies only... For additional information
we require a written request on official letterhead signed by an
authorized official...

Codex Data Systems, Inc. will be happy to provide a demonstration
to any authorized agency

The first public demonstration of D.I.R.T. was on June 5, 1998
at the SpookTech98 Conference in New York City
Network World - July 1998

DIRT Bugs Strike!
By Winn Schwartau

"Imagine being able to monitor and intercept data from any PC in
the world anytime you want.

Then DIRT's for you.

DIRT stands for Data Interception by Remote Transmission, and if
Codex Data Systems in Bardonia, New York has anything to say
about it, will become the next law enforcement tool to help stop
the bad guys.

The cops are having a terrifically hard time dealing with
cybercrime, and they all put on-line child pornography at the
top of the list because of the emotional response to it.
Suspected terrorists, drug traffickers, money launderers, are
also potential targets for DIRT as are various criminal
organizations which employ anonymity, remote control and
encryption to hide themselves. DIRT represents a fabulous, but
questionably legal/ethical means of information gathering by
intelligence agencies as well as private investigators.
Thus Frank Jones and Codex Data Systems begat DIRT. "We have to
give law enforcement the tools they need to get real criminals.
So many of them are now using encryption, DIRT allows law
enforcement to read encrypted messages."

DIRT operates surreptitiously like a Trojan Horse. It is
transmitted secretly to a target via email in several ways:
either as a proprietary protocol, self extracting executable,
dummy segment fault, hidden ZIP file, application specific
weakness, macro, a steganographic attachment or other methods
the company's technical wizard, Eric Schneider will not divulge.
Once the DIRT-Bug is successfully embedded in the
target machine, two things occur. One, all keystrokes
at the keyboard are secretly captured and when the
target machine is connected on-line, it will stealthily
transmit the captured contents to a remotely located
DIRT-Control Central for analysis. This is how encryption keys
are to be discovered and later used to develop evidence in
criminal cases.

Secondly, when the target is on-line, his PC will invisibly
behave like an anonymous FTP server, giving the folks at
DIRT-Control Center 100% access to all resources. So much for

Dave Banisar Staff Counsel at the Electronic Privacy Information
Center in Washington, DC. said DIRT "Sounds like something the
Stasi would have developed." The problem is enforcement and
abuse he points out. "The only way to control this technology is
after the fact, during the trial when the police have to show
how they obtained evidence."

When I first saw DIRT demonstrated in New York (June 5, 1998), I
thought, "What if this gets out to the entire Internet
community. what will happen if we no longer ever trust our

The vast majority of computer crime goes unrecognized,
unreported and unprosecuted. Despite the fact that the use of
DIRT or a DIRT-like clone developed by the computer underground
violates the Computer Abuse Act of 1984 and an assortment of
other laws, the ability to control it remains extremely slim.
And the uses for DIRT-like software stagger the imagination.
All that someone with DIRT needs to know is your email address.
Period. All he has to do is send you an email, with the embedded
DIRT-Trojan Horse and he's home free, and you are a clueless

Large organizations usually worry about hackers breaking and
entering their networks. Now they have reason to worry that
DIRT-Bugs could invade their networks as well; whether launched
by an investigating law enforcement authority, international
competitors or spies, or just hackers. The last thing in the
world they want is for critical workstations to be broadcasting
passwords, encryption codes and providing complete system access
to whoever controls DIRT-Central.

Unfortunately, most firms with whom I deal have little
implementation of the minor policies they have developed. Thus,
defending against DIRT can be difficult. However, organizations
which utilize NAT and proxies in their firewalls achieve some
degree of confidence that DIRT's remote access capability will
not function. Just the keyboard strokes (and associated private
information) will be broadcast to DIRT-Central.
According to the developers at Codex Data Systems, if you are a
solitary PC sitting on a dial-up or a cable modem, there is
nothing - today - you can do except don't click on your email
attachments. Of course, ignoring email from strangers is always
a good idea. But, if I were a cop or a bad guy using DIRT, I
would certainly go after your home PC as well as the one at
work. It's a whole lot easier, and I am going to learn just as

With the advent of more and more powerful Trojans, such as DIRT
(which only occupies 20K), the threat to our networked systems
gets clearer and clearer. As Frank Jones, the inventor says,
"There are no more secrets with DIRT."

TechWeek - Sept. 1998
Beware the Keystroke Cops
by Sarah Ellerman

Getting DIRT on criminals
"There is another powerful tool for surreptitiously intercepting
data, but it is only available to law enforcement and the
military. Called DIRT (Data Interception and Remote
Transmission), it was released in June by Codex Data Systems,
Inc. Investigators need only know your e-mail address to
secretly install the program. Once they do, investigators can
read your documents, view your images, download your files and
intercept your encryption keys. DIRT was developed to assist law
enforcement in pedophilia investigations, but future uses could
include drug investigations, money laundering cases and
information warfare.

How is DIRT different from Back Orifice? The sale of DIRT is
restricted, while Back Orifice is free for the downloading.
Also, there are already fixes available for Back Orifice, but no
way yet to defend against DIRT. "

Most feel secure when they encrypt their data, but it's an
illusion of comfort if a keystroke monitor is involved. DIRT
defeated Pretty Good Privacy in a matter of minutes at a recent
conference simply by stealing the user's key as it was typed

Internet & Intranet Business & Technology Report - Oct. 1998
D.I.R.T. - The Ultimate Competitive Intelligence Tool
by Deb Cameron

"Codex Data Systems, Inc. of New York has created Data
Interception for Remote Transmission (DIRT), a surveillance tool
designed for law enforcement professionals. DIRT is similar to
BO in some respects, but it is smaller (less than 18K versus
120K for BO) and yet more stealthy. It runs as a much lower
level process and is virtually undetectable. In addition, it
cannot be stopped by firewalls.

DIRT was originally developed to aid in the investigation of
child pornographers and other isolated criminals using
standalone PCs. By becoming a spy in the user's computer, the
law enforcement official can gather needed evidence to
successfully prosecute a criminal case. Frank Jones, creator of
DIRT, surveyed the market for computer surveillance tools to aid
law enforcement professionals. When he found no suitable
products, he began developing DIRT, which he continues to

DIRT logs all keystrokes on the target workstation and transmits
them the next time that system is online. Because users type in
their encryption pass phrases at the keyboard, which are then
transmitted via DIRT, the product helps law enforcement
officials decrypt documents and provides them with substantial
evidence for criminal investigations. All DIRT communications
are encrypted on their way back to the DIRT Control Center,
protecting them in case they are intercepted by a random system

In the latest version of DIRT, the agency need not send the
software as an e-mail message at all; the law enforcement agency
needs only the e-mail address or the IP address of the target
system. (At the very least, the variety of techniques described
here should make users wary of dismissing the idea that a third
party could install software without their knowledge.)
DIRT currently runs on Windows 95, 98, and NT systems and a Unix
version is being developed. Only qualified law enforcement
agencies can purchase DIRT; furthermore, Codex currently sells
the software only to U.S. law enforcement agencies.

Jones emphasizes that surreptitious surveillance tools, such as
Back Orifice and keystroke logging facilities, are illegal to
develop or possess in the United States, according to U.S. code
2512. These tools are illegal even if they are used by network
administrators unless each end user explicitly agrees to the

DIRT is legal because it is a law enforcement tool that can only
be sold to law enforcement agencies. DIRT itself is not a threat
to the average corporate network, but the knowledge that such a
tool exists should make users consider whether their networks
are secure. Security is clearly a relative term, and
organizations ignore security issues at their own risk."

Additional Info requests by Authorized Agencies ONLY

İİİİ Copyright 1998-1999 CodexDataSystems, Inc All Rights Reserved


April '99

Last November hackers from Hong Kong began assaulting the IUFO
list and one could actually see the progress they were making
in infiltrating it. They managed after about 50 tries to steal
my email and begin sending email to the list as if it were me.
Fortunately everyone there has known me for many, many years and
we apprehended the gentleman. I even received an apologetic
note from him and his "company". They even went so far as to
recognize my efforts on China's behalf in supporting many of their
issues. We thought that was it for that. By December, another
list began to be assaulted in a far more insidious way. Slipping
virus's, compromising both ICQ and the AOL-IM gateway they worked
full time on seizing control of individual systems which not only
provided them a means to leap about the Internet undetected but
to wind up owning the systems they seized in essence. *A Major Bank*
Visa got compromised, *A Phone Company* and a host of really visable
and detrimental systems were absorbed and infiltrated. Now none
of these companies are going to admit it but take my word for it,
these people have come to OWN the Internet and anyone/everyone
they deem worth monitoring or destroying. In fact, as I was tracking
them and getting very close to nailing them, my system was finally
compromised and destroyed by the CIH virus thus my computer became
a potted plant. The month it was down while I scrapped up the
pennies to replace it, I had more hits to my little site then during
its entire duration up to that point. They were checking to see
how long or when I would recover. The following note out of Europe
I believe finally identifies who these villains are and it is my
belief that they utilized a series of list's and list members to
test their software. We determined that these people were a group
that had 24/7 coverage globally, had technical resources that were
state of the art and an agenda that was geared and designed to
monitor or control any and every system via the Internet. As you
will read, this note exposes a group who fulfill the criteria we
already ascertained, exactly. My thanks to SWingate of IUFO and
DCampbell of IPTV for this exceedingly important story.


Everything you ever wanted to know about the state of the art
regarding deprivation of the right to privacy, free speech and the
right to peaceably assemble... now brought to you on a global
basis. Leave it to the Brit's to come out with things we should have
been aware of years ago... and leave it to us to export more
draconian fascist means to deprive all peoples everywhere of the
basic rights's we've come to laughably believe we enjoy. Folks, its
going to be a very strange year indeed.


Date: Tuesday, May 04, 1999
Latest developments on international interception policy

30 APRIL 1999
This note contains pointers to articles just published about the
latest developments in European Union communications interception
policy, including monitoring the Internet. The most important
article identifies a hitherto unknown FBI-founded organization
called ILETS, which has met in secret for 6 years, and which has
- unknown until now - led initiatives >around the world to build
comprehensive interception systems into new telecommunications

The full story about ILETS is published this week in Telepolis, the
European on-line magazine, at:

And in German at:

The news story is in English in the Guardian (UK) at:

And also in Telepolis:

And in German at:

The latter three reports describe how the latest version of the
ENFOPOL interception plan has just been leaked in London. It reveals
that although the name of the key document has been changed, European
officials still want to make tapping the Internet official European
policy by the end of May. They are pressing on, despite domestic
opposition in Germany and Austria and recent criticism by the
European Parliament.

The new document is called ENFOPOL 19. It was obtained this week by
the Foundation for Information Policy Research (FIPR). (The name
ENFOPOL (Law ENFOrcement/POLice matters) is the generic title given
to documents on these subjects by the European Commission.)
FIPR has put the ENFOPOL 19 document online at:

These articles bring up to date the story of secret co-operation on
interception between the US, Canada, Australia, New Zealand, the UK
(ie, the UKUSA group), and the so-called "G5" group of EU nations
(Germany, France, Sweden, the Netherlands and the UK). Outside,
the EU Norway and Hong Kong are members of ILETS. Within the EU,
Austria, Belgium, Luxembourg, Ireland, Italy, Greece, Eire, Denmark,
Finland, Spain and Portugal have participated in ILETS.

This co-operation was first noticed in 1997, when the Statewatch
group in London found and publicised an EU resolution on interception
that had been adopted in January 1995, but which was not published
until November 1996.

Observers noted that the European 1995 policy bore an unmistakable
resemblance to US legislation, in particular the 1994 Communication
Assistance to Law Enforcement Act (CALEA). Since then legislation
passed and/or proposed in Australia and other EU states has shown the
same similarities.

The article about ILETS now reveals how this has happened, through a
common technical document called "IUR1.0" or "IUR95".
An updated IUR, which made new demands for Internet interception,
security measures, automatic downloading of subscriber personal
information (among other measures) was drawn up in 1998. In
September 1998, it was presented to the EU's Police Co-operation

Working group as "ENFOPOL 98".

In November 1998, the German on-line magazine Telepolis obtained and
published ENFOPOL 98. The stories above describe how ENFOPOL 98 has
progressed since.

The original ENFOPOL 98 story was reported in English in December 1998: http://www.gn.apc.org/duncan/Enfopol_98_Obs.htm

Telepolis has put the original (and scary) ENFOPOL 98 plan online at:

And in German at:

Erich Moechel and Armin Medosch have published English language
accounts of their scoop at:

The original scoop (in German) is at:


Further information about ILETS and communications interception will
be published in the near future by STOA, the Science and Technology
Options Assessment Office of the European Parliament. This is
contained in a detailed report I have written for STOA, "Interception
Capabilities 2000" (IC2000).

The full title of the IC2000 report is "The state of the art in
Communications intelligence (Comint) of automated processing for
intelligence purposes of intercepted broadband multi-language leased
or common carrier systems, and its applicability to Comint targeting
and selection, including speech recognition". This is one of four
reports commissioned by STOA, concerning "The development of
surveillance technology and risk of abuse of economic information".
The other three studies cover legal, cryptographic and general issues.

IC2000 provides a documentary account of new ECHELON sites, systems
and targets and an assessment of current Comint technology.


* Further information would be welcome as to the extent to which the
IUR1995 and 1998 "requirements" have progressed into law in
individual member or related countries.

* Among the issues currently being discussed in the ILETS group is
cross-border interception arrangements and agreements; interception
of Iridium and other satellite-based personal communications (mobile

Duncan Campbell
IPTV, Edinburgh

To find out more... thanks to D. Linen


View of "information warfare and U.S. critical infrastructure":
URL Details

URLed World Description: DIRT- Data Interception by Remote
Transmission - D.I.R.T.

Valuation: 168
*infowar: air force, army, cia, classified, communication, crime,
defense, espionage, fbi,
federal, government, information warfare, intelligence, military,
national security, navy, nsa, secret, spies, spy, state, surveillance

*system-qualities: secur, software, system, verif
disciplines: comput, econom, electr, research
genre: classi, communications, data, e-mail, information, network, review, software, warning

organizations: agency, college, committee, department, federal, state

roles: general, investigator


...money laundering cases and information warfare. How is DIRT...

legal/ethical means of information gathering by intelligence... (4 more)
www.codexdatasystems.com/cdsnews.html [excerpted by google]

TO Links:

1."D.I.R.T." > Hacking - The World's Greatest Hacking Links - Hacking

- Hacking - Hacking

(Virtual) TO Links:

1.Hacking - The World's Greatest Hacking Links - Hacking - Hacking -


How to Build a HERF Device

How to Build a LASER Listener

(no link text)

1.The Army C2 Protect Program Management Plan (PMP)


United States Army

2.Information Superiority


United States Air Force

3.Information Technology Security Bulletin 43


Royal Canadian Mounted Police

4.Command, control and communications systems


Department of National Defense


Defense Research Establishment, Ottawa


Canadian Forces College

5.FBI - ANSIR Program


Federal Bureau of Investigation

6.(CCIPS) - Computer Crime and Intellectual Property Section


U.S. Department of Justice


Drug Enforcement Administration


U.S. Marshals Service



U.S. Secret Service


Bureau of Alcohol, Tobacco and Firearms


U.S. Customs Service


Financial Crimes Enforcement Network



Central Intelligence Agency


National Reconnaissance Office

9.NSA INFOSEC Page - Centers Of Academic Excellence in Information ...


National Security Agency

10.IW: Considering the New Battlefield > IW > Information Warfare > IW

from Canada


Communications Security Establishment

11.CSIS 1996 Public Report


Canadian Security Intelligence Service

Front Page or Contents

Techno Warfare/ MACRO-USGOV Espionage Operations - Page 1
 Techno Warfare/MACRO-USGOV Espionage Operations - Page 2
 Techno Warfare/MACRO-USGOV Espionage Operations - Page 3
Techno Warfare/MACRO-USGOV Espionage Operations - Historicals