ECHELON is a name used to describe a highly secretive world-wide signals intelligence and analysis network run by the UKUSA Community (otherwise described as the "Anglo-Saxon alliance") that has been reported by a number of sources including, in 2001, a committee of the European Parliament. According to some sources ECHELON can capture radio and satellite communications, telephone calls, faxes, e-mails and other data streams nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. The EP committee, however, concluded that "the analysis carried out in the report has revealed that the technical capabilities of the system are probably not nearly as extensive as some sections of the media had assumed."
The EP committee stated that "it seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail." The U.S. intelligence community uses many code names. See, for example, CIA cryptonym.
Reportedly created to monitor the military and diplomatic communications of the Soviet Union and its East Bloc allies during the Cold War in the early sixties, ECHELON is today believed to also search for hints of terrorist plots, drug-dealers' plans, and political and diplomatic intelligence. But some critics claim the system is also being used for large-scale commercial theft and invasion of privacy.
The interception of communications intended to be private goes back to ancient times. (See Genesis 27:5 and The Codebreakers Ch. 2). While the details of methods and capabilities are highly sensitive and protected by special laws (e.g. 18 USC 798), gathering signals intelligence (SIGINT) is an acknowledged mission of the U.S. National Security Agency. As of August 2006, their web site had a FAQ page on the topic, which states:
"NSA/CSS’s Signal Intelligence mission is to intercept and analyze foreign adversaries' communications signals, many of which are protected by codes and other complex countermeasures. We collect, process, and disseminate intelligence reports on foreign intelligence targets in response to intelligence requirements set at the highest levels of government. ... Foreign intelligence means information relating to the capabilities, intentions, and activities of foreign powers, organizations or persons."
In 2001, the EP report (p. 19) recommended that citizens of member states routinely use cryptography in their communications to protect their privacy. In the UK, the government introduced the Regulation of Investigatory Powers Act which gives authorities the power to demand that citizens hand over their encryption keys, without a judge-approved warrant. In April 2004, the European Union decided to spend 11 million EUR developing secure communication based on quantum cryptography — the SECOQC project — a system that would theoretically be unbreakable by ECHELON or any other espionage system.
The ability to intercept communications depends on the medium used. (EP report p.30 ff) During World War II and through the 1950s, high frequency ("short wave") radio was widely used for military and diplomatic communication (The Codebreakers, Ch. 10, 11), and could intercepted at great distances. (EP report p. 33) The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The EP report states (p. 34) "If UKUSA States operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites." Many, if not most reports on ECHELON focus on satellite interception.
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics. As of 2006, 99 percent of the world's long-distance voice and data traffic is carried over optical-fiber cables. The 2001 EP report (p. 37) states that "the proportion of international communications accounted for by satellite links has decreased substantially over the past few years in Central Europe; it lies between 0.4 and 5%." Even in less developed part of the world, such as latin America, communications satellites are largely used for point-to-multipoint applications, such as video. The EU report concludes (p.11) "this means that the majority of communications cannot be intercepted by earth stations, but only by tapping cables and intercepting radio signals, something which - as the investigations carried out in connection with the report have shown - is possible only to a limited extent.
One approach is to place intercept equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at a relatively small number of sites. There have been reports of one such intercept site in the United States. In the past, much Internet traffic was routed through the U.S. and the UK. However this is less true at present. According the to the 2001 EP report, p. 33, "95% of intra-German Internet communications are routed via a switch in Frankfurt." Thus for a worldwide surveillance network to be comprehensive, either illegal intercept sites would be required on the territory of friendly nations or cooperation of local authorities would be needed. The EP report points out (p. 27) "interception of private communications by foreign intelligence services is by no means confined to the US or British foreign intelligence services." U.S. intelligence maintains liaison relationships with countries all over the world.  Some reports of cooperation involving signals intelligence have come to light since the September 11, 2001 attacks on the United States. Monitoring of mobile phones in Pakistan was reportedly used to track Khalid Shaikh Mohammed before he was arrested in Rawalpindi on March 1, 2003 (How Tiny Swiss Cellphone Chips Helped Track Global Terror Web, New York Times, March 4, 2004)
US intelligence agencies are generally prohibited from spying on people inside the US, and other Western countries' intelligence services generally faced similar restrictions within their own countries. There are allegations, however, that ECHELON and the UKUSA alliance were used to circumvent these restrictions by, for example, having the UK facilities spy on people inside the US and the US facilities spy on people in the UK, with the agencies exchanging data. The NSA state on its SIGINT FAQ web page "We have been prohibited by executive order since 1978 from having any person or government agency, whether foreign or U.S. conduct any activity on our behalf that we are prohibited from conducting ourselves. Therefore, NSA/CSS does not ask its allies to conduct such activities on its behalf nor does NSA/CSS do so on behalf of its allies."
The proposed US-only "Total Information Awareness" program relied on technology similar to ECHELON, and was to integrate the extensive sources it is legally permitted to survey domestically, with the "taps" already compiled by ECHELON. It was cancelled by the U.S. Congress in 2004.
It has been alleged that in 2002 the Bush Administration extended the ECHELON program to domestic surveillance. This controversy was the subject of the New York Times eavesdropping exposé of December, 2005 .
The members of the English-speaking alliance are part of the UKUSA intelligence alliance that has maintained ties in collecting and sharing intelligence since World War II. Various sources claim that these states have positioned electronic-intercept stations and space satellites to capture most radio, satellite, microwave, cellular and fiber-optic communications traffic. The captured signals are then processed through a series of supercomputers, known as dictionaries, that are programmed to search each communication for targeted addresses, words, phrases or even individual voices.
Each member of the UKUSA alliance is assigned responsibilities for monitoring different parts of the globe. Canada's main task used to be monitoring northern portions of the former Soviet Union and conducting sweeps of all communications traffic that could be picked up from embassies around the world. In the post-Cold War era, a greater emphasis has been placed on monitoring satellite, radio and cellphone traffic originating from Central and South America, primarily in an effort to track drugs and non-aligned paramilitary groups in the region. The United States, with its vast array of spy satellites and listening posts, monitors most of Latin America, Asia, Asiatic Russia and northern China. Britain listens in on Europe and Russia west of the Urals as well as Africa. Australia hunts for communications originating in Indochina, Indonesia and southern China. New Zealand sweeps the western Pacific.
Supporters stress that ECHELON is simply a method of sorting captured signals and is just one of the many arrows in the intelligence community's quiver, along with increasingly sophisticated bugging and communications interception techniques, satellite tracking, through-clothing scanning, automated biometric recognition systems that can recognize faces, fingerprints & retina patterns.
The U.S. communications-intelligence agency is the National Security Agency (NSA), which is headquartered at Fort Meade, just outside Washington, DC. Although the NSA budget is classified, as of 1996 the agency was estimated to have a global staff of roughly 38,000 and a budget of approximately US$3.6-billion. The UK equivalent organisation is the Government Communications Headquarters GCHQ based near Cheltenham. Further, smaller organisations exist to provide communications technology and expertise (e.g. Her Majesty's Government Communication Centre HMGCC).
By comparison, Canada's communications-intelligence operations are conducted by the Communications Security Establishment (CSE), a branch of the Canadian Department of National Defence. It has a staff of 890 people and an annual budget of $110 million CAD. The CSE's headquarters is the Sir Leonard Tilley Building on Heron Road in the nation's capital of Ottawa, Ontario, and its main communications intercept site is located on an old armed-forces radio base in Leitrim, just south of Ottawa.
On July 6, 2000 the BBC published an article called Echelon: Big brother without a cause? that said:
The Echelon spy system, whose existence has only recently been acknowledged by US officials, is capable of hoovering up millions of phone calls, faxes and emails a minute. [...] Echelon evolved out of Cold War espionage arrangements set up by the US and UK in 1948, and later bringing in Australia, Canada and New Zealand, in their capacity as Britain's Commonwealth partners. The biggest of Echelon's global network of listening posts is at Menwith Hill, North Yorkshire, where about 30 "giant golf balls" called radomes litter the landscape. The system also boasts 120 American satellites in geostationary orbit. Bases in the five countries are linked directly to the headquarters of the secretive US National Security Agency (NSA) headquarters at Fort Mead, Maryland. The system's superpowerful voice recognition capability enables it to filter billions of international communications for whatever key words or word patterns are programmed in.
"The United States will occasionally have the United Kingdom keep an eye on individuals in this country [meaning inside the US], with the understanding that if Britain turns up any interesting tidbits, it will slide them across the table." - from the book, "CHATTER: Dispatches from the Secret World of Global Eavesdropping"
According to an article in UK's Techworld, Echelon may be similar to a Texas Memory Systems SAM supercomputer, which incorporates a solid state disk (SSD) and a digital signal processor (DSP).
Margaret Newsham claims that she worked on the configuration and installation of some of the software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California and in Menwith Hill, England. At that time, according to Newsham, the ECHELON system was based on a VAX, and code named P415 . Its two main programs were called SILKWORTH and SIRE. A satellite named VORTEX would intercept communications. Alongside VORTEX were NEXUS, SCOUT, and NOSTRADAMUS, widely reputed to be the first satellite deployed with a 64-bit processor.
Jonathan Meier, in his acclaimed biography, has stated of his time at the NSA that:
"Conjecture and speculation were rampant on the [ECHELON] projects, even internally. Truthfully, very few individuals were privy to the logistics involved."
Some of the known or suspected ground stations belonging to or participating in the ECHELON network include the following:
The largest and best-attested ground stations
* Fort Meade (Maryland, US) (headquarters of NSA)
* Geraldton (Western Australia, Australia)
* Menwith Hill (Yorkshire, UK)
* Misawa Air Base (Japan)
* Morwenstow (Cornwall, UK)
* Pine Gap (Northern Territory, Australia - close to Alice Springs)
* Sabana Seca (Puerto Rico - US)
* Shoal Bay (Northern Territory, Australia)
* Sugar Grove (West Virginia, US)
* Yakima (Washington, US) Map
* Waihopai (New Zealand)
* Tangimoana (New Zealand)
* Naval Communication Station Harold E. Holt (Western Australia, Australia - close to Exmouth)
Various other ground stations
The following are various intelligence gathering stations of US intelligence agencies and armed forces or their allies.
* Alert (Ellesmere Island, Nunavut, Canada)
* Agios Nikolaos (Cyprus - UK)
* Bremerhaven (Germany - UK)
* Buckley Air Force Base (Colorado, US)
* RAF Chicksands (Bedfordshire, UK)
* Diego Garcia (Indian Ocean - US-UK)
* Digby (Lincolnshire, UK)
* Elmendorf Air Force Base (Alaska - US)
* Feltwell (Norfolk, UK)
* Fort Gordon (Georgia, US)
* Gander (Newfoundland and Labrador, Canada)
* Gibraltar (UK)
* Griesheim (near Darmstadt, Germany - US)
* Guam (Pacific Ocean, US)
* Karamursel (Turkey - US)
* Kunia (Hawaii, US)
* Leitrim (south of Ottawa, Canada)
* Malta (Malta - UK)
* Masset (British Columbia, Canada)
* Medina Annex (Texas, US)
* Osan Air Base (South Korea, US)
* Rota, Spain (Spain - US)
* Scampton (Lincolnshire, UK)
Former ground stations
* Augsburg (Germany - US) - closed in 1993
* Bad Aibling (Germany - US) - moved to Griesheim in 2004
* Clark Air Base (Philippines - US) - closed in 1997
* Edzell (Scotland, UK) - closed in 1997
* Kabkan (Iran - US) - closed in 1979
* Little Sai Wan (Hong Kong - UK) - closed in 1984
* Nurrungar (South Australia, Australia - south of Woomera, South Australia) - closed in 1999
* San Vito dei Normanni (Italy - US) - closed in 1994
* Teufelsberg (West Berlin, Germany - US) - closed in 1989
* Silvermine (near Cape Town, South Africa - US)
SAMPLE KEYWORDS THAT TRIGGER THE ECHELON's EARS
Explosives, guns, assassination, conspiracy, primers, detonators, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, hmtd, picric acid, silver nitrite, mercury fulminate, presidential motorcade, salt peter, charcoal, sulfur, c4, composition b, amatol, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D! , SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Awarehouse, Active X, Compsec 97, RENS, LLC, DERA, JIC, ri! p, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Donaldson, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Bunker, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, S! ORT, AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM, SUKLO, SUSLO, TELINT, fake, TEXTA, ELF, LF, MF, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z- 200, 15kg, UVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, Rapid Reaction, JSOF! C3IP, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, High Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, Alouette, executive, Event Security,! Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch, hope, emc, industr! ial espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, Phon- e, Chicago! Posse, NSDM, l0ck, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press- release, WISDIM, burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, SM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement, ISWG, $ @, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, ID! EA, garbage, market, beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, fi! lofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $, impact, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL, SPINTCOM, ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed, Avi, shelter, Crypto AG ...