UG#596 - Lifting The Lid on The NSA (Secret Rooms, Infiltration, Menwith Hill)
Robin Upton | 07.12.2012 23:38 | Analysis | Repression | Technology | Sheffield
This week we learn more about NSA, which no longer limits its activities to mere intelligence gathering. Whistle-blower Mark Klein tells how he broke the NSA's unwarranted wiretapping scandal, Kevin Zeese speaks on a century of political infiltration of US political movements, and infiltration of Occupy movements and we conclude with researcher Steve Schofield on the NSA's largest base in Europe.
In our first hour this week, we hear an interview of whistle-blower, Mark Klein. Klein, an AT&T telecoms engineer, decided after his retirement to disclose information he randomly came across about the NSA's construction of a secret room which he discovered was intercepting all Internet traffic. He tells about his experiences trying to bring this to the attention of the national media, and of the book he subsequently wrote and self-published, Wiring Up The Big Brother Machine and Fighting It.
Next we hear Cheryl from 9-11 Wake-Up Call interviewing Kevin Zeese on how the US government's long history of infiltrating political movements of all stripes. Over the last century, he reports, infiltration has been the norm, not the exception. He has recently coauthored an article entitled Occupy, Infiltration of Political Movements is the Norm, Not The Exception in The United States. One of the organizers of Occupy Wall St., he focuses particularly on the governments use fo infiltration to try to undermine, divide and misdirect the Occupy Movement.
We conclude the show with researcher and UK CND activist, Steve Schofield on a report he published into RAF Menwith Hill, formerly under the control of the UK's Royal Air Force, now the NSA's largest base in Europe, employing over 2000 people. He reports on the difficulty of establishing what is going on there, given that in spite of whistle-blowers having given evidence of illegal commercial spying being carried out to advantage US companies, the UK government has effectively no oversight. His research indicates that such bases are no mere centers of intelligence gathering but are increasingly working as operational centers for high technology warfare using unaccountable US special forces and predatory drones and as centers of commercial espionage. Should UK taxpayers be subsidizing this?
Next we hear Cheryl from 9-11 Wake-Up Call interviewing Kevin Zeese on how the US government's long history of infiltrating political movements of all stripes. Over the last century, he reports, infiltration has been the norm, not the exception. He has recently coauthored an article entitled Occupy, Infiltration of Political Movements is the Norm, Not The Exception in The United States. One of the organizers of Occupy Wall St., he focuses particularly on the governments use fo infiltration to try to undermine, divide and misdirect the Occupy Movement.
We conclude the show with researcher and UK CND activist, Steve Schofield on a report he published into RAF Menwith Hill, formerly under the control of the UK's Royal Air Force, now the NSA's largest base in Europe, employing over 2000 people. He reports on the difficulty of establishing what is going on there, given that in spite of whistle-blowers having given evidence of illegal commercial spying being carried out to advantage US companies, the UK government has effectively no oversight. His research indicates that such bases are no mere centers of intelligence gathering but are increasingly working as operational centers for high technology warfare using unaccountable US special forces and predatory drones and as centers of commercial espionage. Should UK taxpayers be subsidizing this?
Robin Upton
e-mail:
unwelcome [At] unwelcome Guests [d0t] net
Homepage:
www.unwelcomeguests.net/596
Comments
Hide the following comment
further reading
08.12.2012 14:29
Virtual Reality
Inference and Cover Stories
Unofficial Vocabulary
Error Messages: The Importance of Good Design
Menwith Hill: The Strategic Roles & Economic Impact of the US Spy Base in Yorkshire
Massive Expansion of NSA Menwith Hill Spy Base
monitoring use of the SIPRNet
Who Watches the Watchmen?
nsa-spybases-expansions
us-nro-ground-sations
sat-guide
INTERFERENCE WITH DEPARTMENT OF DEFENSE COMMUNICATIONS SATELLITES
Space Component of US Military Strategy
Snooping on Space Pictures
NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance
Satellite Surveillance: Domestic Issues
Defense Science Board Task Force on Satellite Reconnaissance
Electronic Intelligence (ELINT) at NSA
NSA And Computer Development
British Bases in Cyprus and Signals Intelligence
NSA to intercept TETRA police networks
NSA Review of Information for the Public
NSA Overview of Cloud Computing
Building your presence with Facebook Pages: A guide for Military Organizations
COMINT Satellites - A Space Problem
Sat Wars: When the Enemy Has Our Eyes
Eyeballing Spy Satellites
NSA spy guide
NSA Blueprint for a Science of Cybersecurity
DoD Scientific and Engineering Integrity
Shell Trojan Generators/Droppers/Backdoors
DoD Releases Cloud Computing Strategy
Governments Global Spying of Cloud Services
New Smartphones and the Risk Picture
Mobile Device Location Needs USG Protection
Better Mobile Devices Info Security Needed
NIST SP800-124 Mobile Device Security Guidelines
Psychological Profiles of Anonymous Leadership
Assessment of Anonymous Threat to Control Systems
Anon Project Mayhem DHS Report
Civil Disturbance and Criminal Tactics of Protest Extremists
Military Police Civil Disturbance Operations
Raytheon Cybersecurity Technology
Raytheon Intelligence and Information Systems
Nuclear Effects on Fiber Optic Transmission Sys
DoD Responsibilities for Critical Infrastructure
The Surveillance Catalog: Hacking (11 documents)
Social Media in Strategic Communication
Detecting and Defeating Government Interception Attacks Against SSL
Hacking PGP
Soviet Capabilities in Electronic Warfare
Soviet Wing-in-Ground-Effect Vehicles
State Department brings U.S. IT companies to Thailand to criticize open source.
CHINA'S ANGST OVER U.S. SATELLITE INTERCEPTION
China Military and Security Developments 2010
The Chinese Army Signals Intelligence and Cyber Reconnaissance Infrastructure
Diamond aircraft used for civilian surveillance, sold to China, US, Saudi Arabia.
Chinese Stealth Aircraft Photos
Iran Net Filter/Monitor in Developing Countries
Iran Computer Crimes
Belarus moves to control the Internet based on Sweden, France, Germany, US.
BIOS OF INDIAN CYBERSECURITY EXPERTS
BENIN'S NOMINEES FOR CYBERCRIME WORSHOP
ARGENTINA: FUGITIVE HACKER RETURNS TO ARGENTINA AND THREATENS TO TELL ALL
The Fall of the Shah of Iran: A Chaotic Approach
CRITICAL FOREIGN DEPENDENCIES (CRITICAL INFRASTRUCTURE AND KEY RESOURCES LOCATED ABROAD)
Nicola!