UG#596 - Lifting The Lid on The NSA (Secret Rooms, Infiltration, Menwith Hill)
Robin Upton | 07.12.2012 23:38 | Analysis | Repression | Technology | Sheffield
This week we learn more about NSA, which no longer limits its activities to mere intelligence gathering. Whistle-blower Mark Klein tells how he broke the NSA's unwarranted wiretapping scandal, Kevin Zeese speaks on a century of political infiltration of US political movements, and infiltration of Occupy movements and we conclude with researcher Steve Schofield on the NSA's largest base in Europe.
In our first hour this week, we hear an interview of whistle-blower, Mark Klein. Klein, an AT&T telecoms engineer, decided after his retirement to disclose information he randomly came across about the NSA's construction of a secret room which he discovered was intercepting all Internet traffic. He tells about his experiences trying to bring this to the attention of the national media, and of the book he subsequently wrote and self-published, Wiring Up The Big Brother Machine and Fighting It.
Next we hear Cheryl from 9-11 Wake-Up Call interviewing Kevin Zeese on how the US government's long history of infiltrating political movements of all stripes. Over the last century, he reports, infiltration has been the norm, not the exception. He has recently coauthored an article entitled Occupy, Infiltration of Political Movements is the Norm, Not The Exception in The United States. One of the organizers of Occupy Wall St., he focuses particularly on the governments use fo infiltration to try to undermine, divide and misdirect the Occupy Movement.
We conclude the show with researcher and UK CND activist, Steve Schofield on a report he published into RAF Menwith Hill, formerly under the control of the UK's Royal Air Force, now the NSA's largest base in Europe, employing over 2000 people. He reports on the difficulty of establishing what is going on there, given that in spite of whistle-blowers having given evidence of illegal commercial spying being carried out to advantage US companies, the UK government has effectively no oversight. His research indicates that such bases are no mere centers of intelligence gathering but are increasingly working as operational centers for high technology warfare using unaccountable US special forces and predatory drones and as centers of commercial espionage. Should UK taxpayers be subsidizing this?
Next we hear Cheryl from 9-11 Wake-Up Call interviewing Kevin Zeese on how the US government's long history of infiltrating political movements of all stripes. Over the last century, he reports, infiltration has been the norm, not the exception. He has recently coauthored an article entitled Occupy, Infiltration of Political Movements is the Norm, Not The Exception in The United States. One of the organizers of Occupy Wall St., he focuses particularly on the governments use fo infiltration to try to undermine, divide and misdirect the Occupy Movement.
We conclude the show with researcher and UK CND activist, Steve Schofield on a report he published into RAF Menwith Hill, formerly under the control of the UK's Royal Air Force, now the NSA's largest base in Europe, employing over 2000 people. He reports on the difficulty of establishing what is going on there, given that in spite of whistle-blowers having given evidence of illegal commercial spying being carried out to advantage US companies, the UK government has effectively no oversight. His research indicates that such bases are no mere centers of intelligence gathering but are increasingly working as operational centers for high technology warfare using unaccountable US special forces and predatory drones and as centers of commercial espionage. Should UK taxpayers be subsidizing this?
Robin Upton
e-mail:
unwelcome [At] unwelcome Guests [d0t] net
Homepage:
www.unwelcomeguests.net/596
Comments
Hide the following comment
further reading
08.12.2012 14:29
http://www.fas.org/irp/nsa/best_practices.pdf
Virtual Reality
http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Virtual_Reality.pdf
Inference and Cover Stories
http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Inference_and_Cover_Stories.pdf
Unofficial Vocabulary
http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Unofficial_Vocabulary.pdf
Error Messages: The Importance of Good Design
http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Error_Messages.pdf
Menwith Hill: The Strategic Roles & Economic Impact of the US Spy Base in Yorkshire
http://goodtimesweb.org/documentation/liftingthelid.pdf
Massive Expansion of NSA Menwith Hill Spy Base
http://www.guardian.co.uk/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion
monitoring use of the SIPRNet
http://www.fas.org/irp/congress/2011_hr/infoshare-qfr.pdf
Who Watches the Watchmen?
http://www.fas.org/sgp/eprint/ross.pdf
nsa-spybases-expansions
http://wlstorage.net/file/nsa-spybases-expansions-fy2008.pdf
us-nro-ground-sations
http://wlstorage.net/file/us-nro-ground-sation-admissions-2008.pdf
sat-guide
http://wlstorage.net/file/sat-guide.pdf
INTERFERENCE WITH DEPARTMENT OF DEFENSE COMMUNICATIONS SATELLITES
http://cables.mrkva.eu/cable.php?id=16988
Space Component of US Military Strategy
http://www.dod.mil/pubs/foi/homeland_defense/strategic_defense_initiative/179.pdf
Snooping on Space Pictures
http://www.fas.org/irp/cia/product/sovssp64.pdf
NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance
http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Doing_Business_Smarter.pdf
Satellite Surveillance: Domestic Issues
http://www.fas.org/sgp/crs/intel/RL34421.pdf
Defense Science Board Task Force on Satellite Reconnaissance
http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/930.pdf
Electronic Intelligence (ELINT) at NSA
http://cryptome.org/nsa-elint.zip
NSA And Computer Development
http://cryptome.org/0002/nsa-computers.pdf
British Bases in Cyprus and Signals Intelligence
http://cryptome.org/2012/01/0060.pdf
NSA to intercept TETRA police networks
http://cryptome.org/nsa-tetra.htm
NSA Review of Information for the Public
http://cryptome.org/2012/01/0072.pdf
NSA Overview of Cloud Computing
http://cryptome.org/2012/01/nsa-cloud.pdf
Building your presence with Facebook Pages: A guide for Military Organizations
http://cryptocomb.org/FacebookGuideMilitaryOrgs.pdf
COMINT Satellites - A Space Problem
http://cryptome.org/0005/nsa-comint-sats.pdf
Sat Wars: When the Enemy Has Our Eyes
http://cryptome.org/mckinlca.zip
Eyeballing Spy Satellites
http://cryptome.org/eyeball/satspy/satspy-eyeball.htm
NSA spy guide
http://cryptome.org/isp-spy/nsa-spy.pdf
NSA Blueprint for a Science of Cybersecurity
http://cryptome.org/2012/09/nsa-sci-cybersecurity.pdf
DoD Scientific and Engineering Integrity
http://cryptome.org/dodi/dodi-3200-20.pdf
Shell Trojan Generators/Droppers/Backdoors
http://cryptome.org/2012/07/shell-trojan-gens.pdf
DoD Releases Cloud Computing Strategy
http://cryptome.org/dodi/dod-cloud-strategy.pdf
Governments Global Spying of Cloud Services
http://cryptome.org/2012/07/gov-spy-cloud.pdf
New Smartphones and the Risk Picture
http://goodtimesweb.org/documentation/nsa-mobile-risks.pdf
Mobile Device Location Needs USG Protection
http://cryptome.org/2012/10/gao-12-903.pdf
Better Mobile Devices Info Security Needed
http://cryptome.org/2012/09/gao-12-757.pdf
NIST SP800-124 Mobile Device Security Guidelines
http://cryptome.org/2012/07/nist-sp800-124.pdf
Psychological Profiles of Anonymous Leadership
http://goodtimesweb.org/covert-operations/fbi-anon-psycho.pdf
Assessment of Anonymous Threat to Control Systems
http://info.publicintelligence.net/NCCIC-AnonymousICS.pdf
Anon Project Mayhem DHS Report
http://cryptocomb.org/Project-Mayhem-DHS.pdf
Civil Disturbance and Criminal Tactics of Protest Extremists
http://goodtimesweb.org/documentation/ProtestExtremists.pdf
Military Police Civil Disturbance Operations
http://cryptome.org/dodi/mp-civil-disturbance-ops.pdf
Raytheon Cybersecurity Technology
http://cryptome.org/0005/raytheon-cysec.zip
Raytheon Intelligence and Information Systems
http://cryptome.org/raytheon-iis.pdf
Nuclear Effects on Fiber Optic Transmission Sys
http://cryptome.org/2012/09/ntia-87-227.pdf
DoD Responsibilities for Critical Infrastructure
http://cryptome.org/dodi/dodd-3020-40.pdf
The Surveillance Catalog: Hacking (11 documents)
http://goodtimesweb.org/surveillance/WSJ-Surveillance-Catalog-11-Hacking-Docs.zip
Social Media in Strategic Communication
http://goodtimesweb.org/surveillance/dod-smisc.pdf
Detecting and Defeating Government Interception Attacks Against SSL
http://goodtimesweb.org/surveillance/hotpets10-Soghoian.pdf
Hacking PGP
http://goodtimesweb.org/documentation/0013.pdf
Soviet Capabilities in Electronic Warfare
http://cryptome.org/soviet-ew.zip
http://cryptome.org/jya/rusigint.htm
Soviet Wing-in-Ground-Effect Vehicles
http://cryptome.org/cia-88-10070.zip
State Department brings U.S. IT companies to Thailand to criticize open source.
http://wikileaks.org/cable/2010/02/10CHIANGMAI18.html#par9
CHINA'S ANGST OVER U.S. SATELLITE INTERCEPTION
http://cables.mrkva.eu/cable.php?id=142532
China Military and Security Developments 2010
http://cryptome.org/dodi/cmpr-2010.zip
The Chinese Army Signals Intelligence and Cyber Reconnaissance Infrastructure
http://goodtimesweb.org/surveillance/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf
Diamond aircraft used for civilian surveillance, sold to China, US, Saudi Arabia.
http://wikileaks.org/cable/2010/02/10VIENNA180.html
Chinese Stealth Aircraft Photos
http://cryptome.org/0003/cn-stealth.pdf
Iran Net Filter/Monitor in Developing Countries
http://cryptome.org/2012/08/ir-internet-filtering.pdf
Iran Computer Crimes
http://cryptome.org/2012/08/ir-computer-crimes.pdf
Belarus moves to control the Internet based on Sweden, France, Germany, US.
http://wikileaks.org/cable/2010/02/10MINSK47.html#par4
BIOS OF INDIAN CYBERSECURITY EXPERTS
http://cables.mrkva.eu/cable.php?id=48874
BENIN'S NOMINEES FOR CYBERCRIME WORSHOP
http://www.wikileaks.ch/cable/2008/06/08COTONOU327.html
ARGENTINA: FUGITIVE HACKER RETURNS TO ARGENTINA AND THREATENS TO TELL ALL
http://cables.mrkva.eu/cable.php?id=190671
The Fall of the Shah of Iran: A Chaotic Approach
http://www.nsa.gov/public_info/_files/cryptologic_quarterly/The_Fall_of_the_Shah_of_Iran.pdf
CRITICAL FOREIGN DEPENDENCIES (CRITICAL INFRASTRUCTURE AND KEY RESOURCES LOCATED ABROAD)
http://cables.mrkva.eu/cable.php?id=192686
Nicola!