Friday, February 25, 2011
ECHELON is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses. Every word of every message in the frequencies and channels selected at a station is automatically searched. The processors in the network are known as the ECHELON Dictionaries. ECHELON connects all these computers and allows the individual stations to function as distributed elements an integrated system. An ECHELON station's Dictionary contains not only its parent agency's chosen keywords, but also lists for each of the other four agencies in the UKUSA system [NSA, GCHQ, DSD, GCSB and CSE]
Menwith Hill pictured above is the worlds largest monitoring communications station and is situated just outside Harrogate, North Yorkshire, on the edge of the Yorkshire Dales in Britain(UK). Its official title is R.A.F Menwith Hill which is misleading since it is actually run by the US National Security Agency(NSA). Menwith Hall is part of the Echelon system of monitoring stations located around the world.
Not only does the NSA monitor all electronic communications including, email, faxes, phone calls through the Echelon system but the U.S government through the FBI(Federal bureau of Investigation) can hear everything that you say, even when your cell phone is turned off. Using your cell phones tracking device authorities can now activate the microphone inside the cell phone allowing them to eavesdrop on any conversation.
In the following video, John Young, creator of the website Cryptome discusses how the Microsoft corporation, and Google store private user information for law enforcement to target sites that they wish to shut down.
The NSA in cooperation with AT&T and other major phone companies have installed secret rooms inside their facilities requiring special NSA approved clearances to enter. In this video Keith Olbermann interviews Mark Klein, an AT&T technician who worked in the Internet room connecting circuits into splitters which were hard-wired into the NSA room. This allowed the NSA to receive a duplicate of every fiber optic signal of all Internet browsing and email going through the AT&T system. Remember next time you browse the Internet, send a fax, email, or make a phone call it is all monitored by our government through the NSA whether it be by your phone company, Microsoft, Google or Echelon.
Another form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters(per Wikipedia). A test of this surveillance technique is demonstrated in the video below when an operator types on a computer keyboard.
In addition to monitoring all electronic communications, they are now watching you from the sky. In this video we see that Houston area law enforcement and federal Homeland Security(DHS) tried to surreptitiously test a new drone which would be used for remote monitoring of U.S. citizens in the Houston area. Channel 2 also received a report of another drone crashing nearby. The drones are already in use over several American cities, but local law enforcement and DHS do not want you to know.