Global Spy System ECHELON Confirmed by Snowden Leak

Worldwide_NSA_signals_intelligence.jpg

The orange dots on the map correspond to the locations of several FORNSAT/ECHELON stations

I stepped from the warmth of our source's London flat. That February night in 1977, the air was damp and cool; the buzz of traffic muted in this leafy north London suburb, in the shadow of the iconic Alexandra Palace.
A fellow journalist and I had just spent three hours inside, drinking Chianti and talking about secret surveillance with our source, and now we stood on the doorstep discussing how to get back to the south coast town where I lived.
Events were about to take me on a different journey. Behind me, sharp footfalls broke the stillness. A squad was running, hard, toward the porch of the house we had left. Suited men surrounded us. A burly middle-aged cop held up his police ID. We had broken "Section 2" of Britain's secrecy law, he claimed.
These were Special Branch, the then-elite security division of the British police.
For a split second, I thought this was a hustle. I knew that a parliamentary commission had released a report five years earlier that concluded that the secrecy law, first enacted a century ago, should be changed. I pulled out my journalist identification card, ready to ask them to respect the press. But they already knew that my companion that evening, Time Out reporter Crispin Aubrey, and I were journalists. And they had been outside, watching our entire meeting with former British Army Signal Intelligence (SIGINT) operator John Berry, who at the time was a social worker.
Aubrey and I were arrested on suspicion of possessing unauthorized information. They said we'd be taken to the local police station. But after being forced into cars, we were driven in the wrong direction, towards the center of London. I became uneasy.
 
From left, journalists Duncan Campbell and John Crispin Aubrey, with former SIGINT operator John Berry in 1978 
It was soon apparent that the elite squad had no idea where the local police station was. They stopped and asked a taxi to lead them there. We were then locked up overnight, denied bail, and sent to London’s Brixton prison.
Aubrey had recorded our interview. During three hours of tapes that the cops took from Aubrey, Berry had revealed spying on Western allies. When the tape was transcribed, every page was stamped "SECRET" in red, top and bottom. Then, with a red felt-tip pen, "Top" was methodically written in front of each "SECRET."
Our discussion was considered so dangerous that we – two reporters and one social worker – were placed in the top floor of the prison maximum security wing, which guards told us had formerly held terrorists, serial murderers, gang leaders and child rapists.
Meanwhile, police stripped my home of every file, every piece of paper I had, and 400 books.
Our case became known as "ABC", named after our surnames Aubrey, Berry and Campbell. We hoped it would end quickly. We knew that the senior minister responsible, Home Secretary Merlyn Rees, had announced three months before that the “mere receipt of unauthorized information should no longer be an offense.”
The day after we were arrested, I was told he was furious to be woken with news that the security agencies had delivered a fait accompli.
Historian Richard Aldrich said the head of MI5 – Britain's Security Service – considered me the person of the greatest interest to see incarcerated.
In 40 years of reporting on mass surveillance, I have been raided three times, jailed once, had television programmes I made or assisted making banned from airing under government pressure five times, seen tapes seized, faced being shoved out of a helicopter, had my phone tapped for at least a decade, and — following my 1977 arrest — faced 30 years' imprisonment for alleged violations of secrecy laws.
And why do I keep going? Because from the beginning, my investigations revealed a once-unimaginable scope of governmental surveillance, collusion and concealment by the British and US governments – and practices that were always as much about domestic spying during times of peace as they were about keeping citizens safe from supposed foreign enemies, thus giving the British government the potential power to become, as our source that night had put it, a virtual “police state.”
A decade later, in a parliamentary debate, Foreign Secretary David Owen revealed that he was initially against our being prosecuted, but was convinced to go along after being promised that we journalists could be jailed in secret:
Everybody came in and persuaded me that it would be terrible not to prosecute ... I eventually relented. But one of my reasons for doing so was that I was given an absolute promise that the case would be heard in camera, a secret hearing.

In the face of this security onslaught, the politicians collapsed and agreed we should all be charged with espionage – although there was no suggestion that we wanted to do anything other than write articles. I was alleged to be "a thoroughly subversive man who was quite prepared to publish information which was secret,” my lawyer later wrote in his memoir.
But my lawyer saw it differently himself.
"Campbell is a journalist ... a ferret, not a skunk," he told the magistrates' court in Tottenham, North London. But when he inquired about the possibility of a misdemeanor plea and a £50 ($75) fine, he was cut down: "That course might be acceptable for Berry and Aubrey. But the security services want Campbell in prison for a very long time."
They meant it. In March 1977, one month after our nighttime arrest, we were all charged with breaking Britain's Official Secrets Act, for the "unlawful receipt of information.” Then we were charged with espionage. Each espionage charge carried a maximum of 14 years. I was also charged with espionage for collecting open source information on UK government plans. In total, I faced 30 years.
The interview, and then our arrests, were a first encounter with the power of Government Communications Headquarters – better known by its acronym GCHQ – Britain's electronic surveillance agency.
The Register: http://bit.ly/1UkVkju

 

« Could Cyberwar Knock Us Back to the Stone Age?
ECHELON Has Been Watching You All Your Life »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.