Global Spy System ECHELON Confirmed by Snowden Leak

Worldwide_NSA_signals_intelligence.jpg

The orange dots on the map correspond to the locations of several FORNSAT/ECHELON stations

I stepped from the warmth of our source's London flat. That February night in 1977, the air was damp and cool; the buzz of traffic muted in this leafy north London suburb, in the shadow of the iconic Alexandra Palace.
A fellow journalist and I had just spent three hours inside, drinking Chianti and talking about secret surveillance with our source, and now we stood on the doorstep discussing how to get back to the south coast town where I lived.
Events were about to take me on a different journey. Behind me, sharp footfalls broke the stillness. A squad was running, hard, toward the porch of the house we had left. Suited men surrounded us. A burly middle-aged cop held up his police ID. We had broken "Section 2" of Britain's secrecy law, he claimed.
These were Special Branch, the then-elite security division of the British police.
For a split second, I thought this was a hustle. I knew that a parliamentary commission had released a report five years earlier that concluded that the secrecy law, first enacted a century ago, should be changed. I pulled out my journalist identification card, ready to ask them to respect the press. But they already knew that my companion that evening, Time Out reporter Crispin Aubrey, and I were journalists. And they had been outside, watching our entire meeting with former British Army Signal Intelligence (SIGINT) operator John Berry, who at the time was a social worker.
Aubrey and I were arrested on suspicion of possessing unauthorized information. They said we'd be taken to the local police station. But after being forced into cars, we were driven in the wrong direction, towards the center of London. I became uneasy.
 
From left, journalists Duncan Campbell and John Crispin Aubrey, with former SIGINT operator John Berry in 1978 
It was soon apparent that the elite squad had no idea where the local police station was. They stopped and asked a taxi to lead them there. We were then locked up overnight, denied bail, and sent to London’s Brixton prison.
Aubrey had recorded our interview. During three hours of tapes that the cops took from Aubrey, Berry had revealed spying on Western allies. When the tape was transcribed, every page was stamped "SECRET" in red, top and bottom. Then, with a red felt-tip pen, "Top" was methodically written in front of each "SECRET."
Our discussion was considered so dangerous that we – two reporters and one social worker – were placed in the top floor of the prison maximum security wing, which guards told us had formerly held terrorists, serial murderers, gang leaders and child rapists.
Meanwhile, police stripped my home of every file, every piece of paper I had, and 400 books.
Our case became known as "ABC", named after our surnames Aubrey, Berry and Campbell. We hoped it would end quickly. We knew that the senior minister responsible, Home Secretary Merlyn Rees, had announced three months before that the “mere receipt of unauthorized information should no longer be an offense.”
The day after we were arrested, I was told he was furious to be woken with news that the security agencies had delivered a fait accompli.
Historian Richard Aldrich said the head of MI5 – Britain's Security Service – considered me the person of the greatest interest to see incarcerated.
In 40 years of reporting on mass surveillance, I have been raided three times, jailed once, had television programmes I made or assisted making banned from airing under government pressure five times, seen tapes seized, faced being shoved out of a helicopter, had my phone tapped for at least a decade, and — following my 1977 arrest — faced 30 years' imprisonment for alleged violations of secrecy laws.
And why do I keep going? Because from the beginning, my investigations revealed a once-unimaginable scope of governmental surveillance, collusion and concealment by the British and US governments – and practices that were always as much about domestic spying during times of peace as they were about keeping citizens safe from supposed foreign enemies, thus giving the British government the potential power to become, as our source that night had put it, a virtual “police state.”
A decade later, in a parliamentary debate, Foreign Secretary David Owen revealed that he was initially against our being prosecuted, but was convinced to go along after being promised that we journalists could be jailed in secret:
Everybody came in and persuaded me that it would be terrible not to prosecute ... I eventually relented. But one of my reasons for doing so was that I was given an absolute promise that the case would be heard in camera, a secret hearing.

In the face of this security onslaught, the politicians collapsed and agreed we should all be charged with espionage – although there was no suggestion that we wanted to do anything other than write articles. I was alleged to be "a thoroughly subversive man who was quite prepared to publish information which was secret,” my lawyer later wrote in his memoir.
But my lawyer saw it differently himself.
"Campbell is a journalist ... a ferret, not a skunk," he told the magistrates' court in Tottenham, North London. But when he inquired about the possibility of a misdemeanor plea and a £50 ($75) fine, he was cut down: "That course might be acceptable for Berry and Aubrey. But the security services want Campbell in prison for a very long time."
They meant it. In March 1977, one month after our nighttime arrest, we were all charged with breaking Britain's Official Secrets Act, for the "unlawful receipt of information.” Then we were charged with espionage. Each espionage charge carried a maximum of 14 years. I was also charged with espionage for collecting open source information on UK government plans. In total, I faced 30 years.
The interview, and then our arrests, were a first encounter with the power of Government Communications Headquarters – better known by its acronym GCHQ – Britain's electronic surveillance agency.
The Register: http://bit.ly/1UkVkju

 

« Could Cyberwar Knock Us Back to the Stone Age?
ECHELON Has Been Watching You All Your Life »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

Aspire Technology Solutions

Aspire Technology Solutions

Aspire is an award-winning IT Managed Service and Cyber Security Provider. We specialise in cyber security, cloud, connectivity, managed services, unified communications and IT support.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.