Skip to content or view screen version

UG#596 - Lifting The Lid on The NSA (Secret Rooms, Infiltration, Menwith Hill)

Robin Upton | 07.12.2012 23:38 | Analysis | Repression | Technology | Sheffield

This week we learn more about NSA, which no longer limits its activities to mere intelligence gathering. Whistle-blower Mark Klein tells how he broke the NSA's unwarranted wiretapping scandal, Kevin Zeese speaks on a century of political infiltration of US political movements, and infiltration of Occupy movements and we conclude with researcher Steve Schofield on the NSA's largest base in Europe.

In our first hour this week, we hear an interview of whistle-blower, Mark Klein. Klein, an AT&T telecoms engineer, decided after his retirement to disclose information he randomly came across about the NSA's construction of a secret room which he discovered was intercepting all Internet traffic. He tells about his experiences trying to bring this to the attention of the national media, and of the book he subsequently wrote and self-published, Wiring Up The Big Brother Machine and Fighting It.

Next we hear Cheryl from 9-11 Wake-Up Call interviewing Kevin Zeese on how the US government's long history of infiltrating political movements of all stripes. Over the last century, he reports, infiltration has been the norm, not the exception. He has recently coauthored an article entitled Occupy, Infiltration of Political Movements is the Norm, Not The Exception in The United States. One of the organizers of Occupy Wall St., he focuses particularly on the governments use fo infiltration to try to undermine, divide and misdirect the Occupy Movement.

We conclude the show with researcher and UK CND activist, Steve Schofield on a report he published into RAF Menwith Hill, formerly under the control of the UK's Royal Air Force, now the NSA's largest base in Europe, employing over 2000 people. He reports on the difficulty of establishing what is going on there, given that in spite of whistle-blowers having given evidence of illegal commercial spying being carried out to advantage US companies, the UK government has effectively no oversight. His research indicates that such bases are no mere centers of intelligence gathering but are increasingly working as operational centers for high technology warfare using unaccountable US special forces and predatory drones and as centers of commercial espionage. Should UK taxpayers be subsidizing this?

Robin Upton
- e-mail: unwelcome [At] unwelcome Guests [d0t] net
- Homepage: www.unwelcomeguests.net/596

Comments

Hide the following comment

further reading

08.12.2012 14:29

Best Practices for Keeping Your Home Network Secure
 http://www.fas.org/irp/nsa/best_practices.pdf

Virtual Reality
 http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Virtual_Reality.pdf

Inference and Cover Stories
 http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Inference_and_Cover_Stories.pdf

Unofficial Vocabulary
 http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Unofficial_Vocabulary.pdf

Error Messages: The Importance of Good Design
 http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Error_Messages.pdf

Menwith Hill: The Strategic Roles & Economic Impact of the US Spy Base in Yorkshire
 http://goodtimesweb.org/documentation/liftingthelid.pdf

Massive Expansion of NSA Menwith Hill Spy Base
 http://www.guardian.co.uk/world/2012/mar/01/menwith-hill-eavesdropping-base-expansion

monitoring use of the SIPRNet
 http://www.fas.org/irp/congress/2011_hr/infoshare-qfr.pdf

Who Watches the Watchmen?
 http://www.fas.org/sgp/eprint/ross.pdf

nsa-spybases-expansions
 http://wlstorage.net/file/nsa-spybases-expansions-fy2008.pdf

us-nro-ground-sations
 http://wlstorage.net/file/us-nro-ground-sation-admissions-2008.pdf

sat-guide
 http://wlstorage.net/file/sat-guide.pdf

INTERFERENCE WITH DEPARTMENT OF DEFENSE COMMUNICATIONS SATELLITES
 http://cables.mrkva.eu/cable.php?id=16988

Space Component of US Military Strategy
 http://www.dod.mil/pubs/foi/homeland_defense/strategic_defense_initiative/179.pdf

Snooping on Space Pictures
 http://www.fas.org/irp/cia/product/sovssp64.pdf

NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance
 http://www.nsa.gov/public_info/_files/cryptologic_quarterly/Doing_Business_Smarter.pdf

Satellite Surveillance: Domestic Issues
 http://www.fas.org/sgp/crs/intel/RL34421.pdf

Defense Science Board Task Force on Satellite Reconnaissance
 http://www.dod.mil/pubs/foi/Science_and_Technology/DSB/930.pdf

Electronic Intelligence (ELINT) at NSA
 http://cryptome.org/nsa-elint.zip

NSA And Computer Development
 http://cryptome.org/0002/nsa-computers.pdf

British Bases in Cyprus and Signals Intelligence
 http://cryptome.org/2012/01/0060.pdf

NSA to intercept TETRA police networks
 http://cryptome.org/nsa-tetra.htm

NSA Review of Information for the Public
 http://cryptome.org/2012/01/0072.pdf

NSA Overview of Cloud Computing
 http://cryptome.org/2012/01/nsa-cloud.pdf

Building your presence with Facebook Pages: A guide for Military Organizations
 http://cryptocomb.org/FacebookGuideMilitaryOrgs.pdf

COMINT Satellites - A Space Problem
 http://cryptome.org/0005/nsa-comint-sats.pdf

Sat Wars: When the Enemy Has Our Eyes
 http://cryptome.org/mckinlca.zip

Eyeballing Spy Satellites
 http://cryptome.org/eyeball/satspy/satspy-eyeball.htm

NSA spy guide
 http://cryptome.org/isp-spy/nsa-spy.pdf

NSA Blueprint for a Science of Cybersecurity
 http://cryptome.org/2012/09/nsa-sci-cybersecurity.pdf

DoD Scientific and Engineering Integrity
 http://cryptome.org/dodi/dodi-3200-20.pdf

Shell Trojan Generators/Droppers/Backdoors
 http://cryptome.org/2012/07/shell-trojan-gens.pdf

DoD Releases Cloud Computing Strategy
 http://cryptome.org/dodi/dod-cloud-strategy.pdf

Governments Global Spying of Cloud Services
 http://cryptome.org/2012/07/gov-spy-cloud.pdf

New Smartphones and the Risk Picture
 http://goodtimesweb.org/documentation/nsa-mobile-risks.pdf

Mobile Device Location Needs USG Protection
 http://cryptome.org/2012/10/gao-12-903.pdf

Better Mobile Devices Info Security Needed
 http://cryptome.org/2012/09/gao-12-757.pdf

NIST SP800-124 Mobile Device Security Guidelines
 http://cryptome.org/2012/07/nist-sp800-124.pdf

Psychological Profiles of Anonymous Leadership
 http://goodtimesweb.org/covert-operations/fbi-anon-psycho.pdf

Assessment of Anonymous Threat to Control Systems
 http://info.publicintelligence.net/NCCIC-AnonymousICS.pdf

Anon Project Mayhem DHS Report
 http://cryptocomb.org/Project-Mayhem-DHS.pdf

Civil Disturbance and Criminal Tactics of Protest Extremists
 http://goodtimesweb.org/documentation/ProtestExtremists.pdf

Military Police Civil Disturbance Operations
 http://cryptome.org/dodi/mp-civil-disturbance-ops.pdf

Raytheon Cybersecurity Technology
 http://cryptome.org/0005/raytheon-cysec.zip

Raytheon Intelligence and Information Systems
 http://cryptome.org/raytheon-iis.pdf

Nuclear Effects on Fiber Optic Transmission Sys
 http://cryptome.org/2012/09/ntia-87-227.pdf

DoD Responsibilities for Critical Infrastructure
 http://cryptome.org/dodi/dodd-3020-40.pdf

The Surveillance Catalog: Hacking (11 documents)
 http://goodtimesweb.org/surveillance/WSJ-Surveillance-Catalog-11-Hacking-Docs.zip

Social Media in Strategic Communication
 http://goodtimesweb.org/surveillance/dod-smisc.pdf

Detecting and Defeating Government Interception Attacks Against SSL
 http://goodtimesweb.org/surveillance/hotpets10-Soghoian.pdf

Hacking PGP
 http://goodtimesweb.org/documentation/0013.pdf

Soviet Capabilities in Electronic Warfare
 http://cryptome.org/soviet-ew.zip
 http://cryptome.org/jya/rusigint.htm

Soviet Wing-in-Ground-Effect Vehicles
 http://cryptome.org/cia-88-10070.zip

State Department brings U.S. IT companies to Thailand to criticize open source.
 http://wikileaks.org/cable/2010/02/10CHIANGMAI18.html#par9

CHINA'S ANGST OVER U.S. SATELLITE INTERCEPTION
 http://cables.mrkva.eu/cable.php?id=142532

China Military and Security Developments 2010
 http://cryptome.org/dodi/cmpr-2010.zip

The Chinese Army Signals Intelligence and Cyber Reconnaissance Infrastructure
 http://goodtimesweb.org/surveillance/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf

Diamond aircraft used for civilian surveillance, sold to China, US, Saudi Arabia.
 http://wikileaks.org/cable/2010/02/10VIENNA180.html

Chinese Stealth Aircraft Photos
 http://cryptome.org/0003/cn-stealth.pdf

Iran Net Filter/Monitor in Developing Countries
 http://cryptome.org/2012/08/ir-internet-filtering.pdf

Iran Computer Crimes
 http://cryptome.org/2012/08/ir-computer-crimes.pdf

Belarus moves to control the Internet based on Sweden, France, Germany, US.
 http://wikileaks.org/cable/2010/02/10MINSK47.html#par4

BIOS OF INDIAN CYBERSECURITY EXPERTS
 http://cables.mrkva.eu/cable.php?id=48874

BENIN'S NOMINEES FOR CYBERCRIME WORSHOP
 http://www.wikileaks.ch/cable/2008/06/08COTONOU327.html

ARGENTINA: FUGITIVE HACKER RETURNS TO ARGENTINA AND THREATENS TO TELL ALL
 http://cables.mrkva.eu/cable.php?id=190671

The Fall of the Shah of Iran: A Chaotic Approach
 http://www.nsa.gov/public_info/_files/cryptologic_quarterly/The_Fall_of_the_Shah_of_Iran.pdf

CRITICAL FOREIGN DEPENDENCIES (CRITICAL INFRASTRUCTURE AND KEY RESOURCES LOCATED ABROAD)
 http://cables.mrkva.eu/cable.php?id=192686

Nicola!