GO HERE FOR INFO - http://www.governmentattic.org/

There are 190 countries in the world.

America has bases in 130 of them. FM 3-39.40 - https://info.publicintelligence.net/USArmy-InternmentResettlement.pdf

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The PATRIOT Act Permits:

*Secret FBI and police searches of your home and office.

*Secret government wiretaps on your phone, computer and/or Internet activity.

*Secret investigations of your bank records, credit cards and other financial records.

*Secret investigations of your library and book activities.

*Secret examination of your medical, travel and business records.

*The freezing of funds and assets without prior notice or appeal.

*The creation of secret "watch lists" that ban those named from air and other travel.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-EXECUTIVE ORDERS/BILLS-

http://www.greatdreams.com/concentration-camp-locations.htm

11110

http://www.rense.com/general44/exec.htm

10990

Allows the government to take control over all modes of transportation, highways, and seaports.

10995

Allows the government to seize and control the communication media.

10997

Allows the government to take over all electrical power, gas, petroleum, fuels, and minerals.

10998

Allows the government to take over all food resources and farms.

10999

Allows the government to take over all modes of transportation.

11000

Allows the government to mobilize civilians into work brigades under government supervision.

11001

Allows the government to take over all health, education, and welfare functions.

11002

Designates the Postmaster General to operate national registration of all persons.

11003

Allows the government to take over all airports and aircraft, including commercial aircraft.

11004

Allows the Housing and Finance Authority to relocate communities, build new housing with public funds, designate areas to be abandoned,

and establish new locations for populations.

11005

Allows the government to take over railroads, inland waterways, and public storage facilities.

11051

Specifies the responsibility of the Office of Emergency Planning and gives authorization to put all Executive Orders into effect in times of

increased international tensions and economic or financial crisis.

11310

Grants authority to the Department of Justice to enforce the plans set out in Executive Orders, to institute industrial support, to establish

judicial and legislative liaison, to control all aliens, to operate penal and correctional institutions, and to advise and assist the President.

11049

Assigns emergency preparedness function to federal departments and agencies, consolidating 21 operative Executive Orders issued over a

fifteen year period.

11921

Allows the Federal Emergency Preparedness Agency to develop plans to establish control over the mechanisms of production and

distribution, of energy sources, wages, salaries, credit and flow of money in the U.S.A. financial institution in any undefined national

emergency.

It also provides that when a state of emergency is declared by the President, Congress cannot review the action for six months.

13603

https://www.whitehouse.gov/the-press-office/2012/03/16/executive-order-national-defense-resources-preparedness

--------------------------------------------------------------------------

Senate Bill #1873

Allows the government to vaccinate you with untested vaccines against your will.

HR 1528

Requires you to spy on your neighbors, including wearing a wire. Refusal would be punishable by a mandatory prison sentence of at least

two years.

--------------------------------------------------------------------------

~Executive Orders Disposition Tables Index~

The Disposition Tables list the status of Executive Orders from:

January 8, 1937 - September 15, 2015

Disposition Tables contain information about Executive Orders beginning with those signed by President Franklin D. Roosevelt and are

arranged according to Presidential administration and year of signature. The tables are compiled and maintained by the Office of the Federal

Register editors.

The Disposition Tables include the following information:

Executive order number;

Date of signing by the President

Federal Register volume, page number, and issue date

Title

Amendments (if any)

Current status (where applicable)

Learn More About Executive Orders And About These Tables

Barack Obama (2009-Present) = http://www.archives.gov/federal-register/executive-orders/obama.html

EOs 13489 - 13707 | Subject Index = http://www.archives.gov/federal-register/executive-orders/obama-subjects.html

George W. Bush (2001-2009) = http://www.archives.gov/federal-register/executive-orders/wbush.html

EOs 13198-13488 | Subject Index = http://www.archives.gov/federal-register/executive-orders/wbush-subjects.html

William J. Clinton (1993-2001) = http://www.archives.gov/federal-register/executive-orders/clinton.html

EOs 12834-13197 | Subject Index = http://www.archives.gov/federal-register/executive-orders/clinton-subjects.html

George Bush (1989-1993) = http://www.archives.gov/federal-register/executive-orders/bush.html

EOs 12668-12833

Ronald Reagan (1981-1989) = http://www.archives.gov/federal-register/executive-orders/reagan.html

EOs 12287-12667

Jimmy Carter (1977-1981) = http://www.archives.gov/federal-register/executive-orders/carter.html

EOs 11967-12286

Gerald R. Ford (1974-1977) = http://www.archives.gov/federal-register/executive-orders/ford.html

EOs 11798-11966

Richard Nixon (1969-1974) = http://www.archives.gov/federal-register/executive-orders/nixon.html

EOs 11452-11797

Lyndon B. Johnson (1963-1969) = http://www.archives.gov/federal-register/executive-orders/johnson.html

EOs 11128-11451

John F. Kennedy (1961-1963) = http://www.archives.gov/federal-register/executive-orders/kennedy.html

EOs 10914-11127

Dwight D. Eisenhower (1953-1961) = http://www.archives.gov/federal-register/executive-orders/eisenhower.html

EOs 10432-10913

Harry S. Truman (1945-1953) = http://www.archives.gov/federal-register/executive-orders/truman.html

EOs 9538-10431

Franklin D. Roosevelt (1933-1945) = http://www.archives.gov/federal-register/executive-orders/roosevelt.html

EOs 6071-9537

Herbert Hoover (1929-1933)

EOs 5075-6070

----------------------------------------------

President Bush has signed executive orders giving him sole authority to impose martial law, and suspend habeas corpus.

This gives him dictatorial power over the people, without any checks and balances.

The government can jail you for life without charges, without a trial, and without a lwayer.

Because of globalization the U.S. must accept other nations' laws.

Under the CAFTA treaty the sale of vitamins and supplements will be illegal.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-US Patents/Agenda 21-

US6630507 - Cannabinoids as antioxidants and neuroprotectants

http://patft.uspto.gov/netacgi/nph-Parser?

Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/PTO/srchnum.htm&r=1&f=G&l=50&s1=6630507.PN.&OS=PN/6630507&RS=PN/6

630507 / http://www.google.com/patents/US6630507

US5676977 - curing AIDS with tetrasilver tetroxide molecular crystal devices

https://www.google.com/patents/US5676977

US6506148 B2 - Nervous System Manipulation By Electromagnetic Fields From Monitors

http://www.google.com/patents/US6506148

CA 2741523 A1 - Human Ebola virus species and compositions and methods

http://www.google.com/patents/CA2741523A1?cl=en

US 8124101 B2 - Genetically engineered swine influenza virus and uses

http://www.google.com/patents/US8124101

US 7413145 B2 - Aerial Dispersion of Materials/CIA's EVERGREEN AIR

http://www.google.com/patents/US7413145

US2972743 - Jun 19, 1957 Feb 21, 1961 Westinghouse Electric Corp Combined infrared-radar antenna

US3371345 - May 26, 1966 Feb 27, 1968 Radiation Inc Radar augmentor

US3391404 - May 18, 1959 Jul 2, 1968 Air Force Usa Passive data transmission technique utilizing radar echoes

US3671963 - Dec 19, 1969 Jun 20, 1972 Thomson Csf Blind landing aids

US3795910 - Mar 13, 1973 Mar 5, 1974 Nasa Microwave power transmission system wherein level of transmitted power is controlled by reflections from receiver

US4121102 - Jul 27, 1976 Oct 17, 1978 Kilo Corporation Object identification system

US4310852 - Apr 8, 1980 Jan 12, 1982 General Dynamics Corp., Electronics Division Real-time electromagnetic radiation intensity distribution imaging system

US4698638 - Dec 26, 1985 Oct 6, 1987 General Dynamics, Pomona Division Dual mode target seeking system

US5000527 - Dec 7, 1989 Mar 19, 1991 British Aerospace Public Limited Company Multiple waveband optical element

US5170168 - Apr 16, 1991 Dec 8, 1992 Standard Elektrik Lorenz Ag Identification of friend from foe device

US5239296 - Oct 23, 1991 Aug 24, 1993 Black Box Technologies Method and apparatus for receiving optical signals used to determine vehicle velocity

US5307077 - Mar 18, 1992 Apr 26, 1994 Hughes Missile Systems Company Multi-spectral seeker antenna

US5369408 - Apr 23, 1990 Nov 29, 1994 The United States Of America As Represented By The Secretary Of The Air Force Self-mixing expendable

US5459470 - Jun 22, 1993 Oct 17, 1995 Electronics & Space Corp. Beam steered laser IFF system

US5748138 - Sep 30, 1996 May 5, 1998 Telle; John M. Synchronous identification of friendly targets

US6150974 - May 17, 1982 Nov 21, 2000 The United States Of America As Represented By The Secretary Of The Navy Infrared transparent radar antenna

US7362258 - Mar 25, 2005 Apr 22, 2008 Honda Motor Co., Ltd. Transponder detection system using radio and light wave signals

US7484857 - Nov 30, 2004 Feb 3, 2009 Massachusetts Institute Of Technology Light modulating mirror device and array

US20050219114 - Mar 25, 2005 Oct 6, 2005 Honda Motor Co., Ltd. Target object detection system

US20060114545 - Nov 30, 2004 Jun 1, 2006 Bozler Carl O Light modulating mirror device and array

US20090042515 - Jul 29, 2008 Feb 12, 2009 Thomas Ostertag Transponder circuit

US20150022389 - Jan 23, 2013 Jan 22, 2015 Robert Bosch Gmbh Radar sensor

(ATCC® VR-84™) - Zika Virus

http://www.atcc.org/products/all/VR-84.aspx#generalinformation

------------------------

http://www.freerepublic.com/focus/f-news/1335656/posts

http://www.freedomadvocates.org/

https://rtsf.wordpress.com/

https://www.youtube.com/watch?v=dUWByt813fA

http://dnr.mo.gov/env/wpp/permits/issued/docs/0136981.pdf

https://dnr.mo.gov/env/wpp/permits/issued/docs/0136981.pdf

http://www.fool.com/investing/general/2016/02/07/bull-vs-bear-kinder-morgan-inc.aspx

https://www.google.com/search?q=Kinder+Morgan+tower&biw=1366&bih=651&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiuytmLv6bNAhVF4YMKHYQ-B0cQ_AUICCgD#tbm=isch&tbs=rimg%3ACXwcOmfLRVelIjgNb1v5TvEmGdfxXIZ1AFoidJhR8WhkRyMfpUKLdJBVue5e3gvBL2XrnEYLk5l0MI_13ctf5j5lY4SoSCQ1vW_1lO8SYZEX2-W79ZywD-KhIJ1_1FchnUAWiIRAbYV10qiEoAqEgl0mFHxaGRHIxHPrwCb_1xKCTyoSCR-lQot0kFW5ESW0aNk-9-3HKhIJ7l7eC8EvZesRWHe_1zsIqQ20qEgmcRguTmXQwjxF6-dGx2ds5_1ioSCfdy1_1mPmVjhEbAL4p9NguDa&q=Kinder%20Morgan%20signal%20tower&imgrc=93LX-Y-ZWOH28M%3A

http://www.ettower.com/towers-copy-copy

http://www.microwave-link.com/

https://www.lbagroup.com/blog/saving-the-am-band-from-rf-noise/

http://www.google.com/patents/US3911433

https://www.lradx.com/sitemap/

-------------------------------------------------------------------------

CDC Admits Polio Vaccine Tainted With Cancer

This is one of the most outrageous vaccination stories I’ve ever come across. The CDC posted on its own website (which was taken down

shortly after this post went viral. Click here for an internet archived copy

http://web.archive.org/web/20130522091608/http://www.cdc.gov/vaccinesafety/updates/archive/polio_and_cancer_factsheet.htm) that

as many as 30 million Americans could be at risk for developing cancer due to polio vaccine tainted with Simian Virus 40 (SV40) found in

some species of monkey.

This story is not new – many of of us who thoroughly researched the vaccination issue before choosing whether or not to immunize were

already aware of this fact years ago.

I became aware of the tainted polio vaccines from 1955-1963 in the late 1990’s and it was one of the primary motivators for me to choose a

“no shots, no way” approach for my children.

What is new is that the CDC is finally admitting it.

What took you so long CDC? Many of the folks vaccinated with the tainted polio stock are already dead from cancer with many more getting

diagnosed each and every day!

Here’s the exact language from the CDC Fact Sheet. I am reprinting it here in it’s entirety in case the CDC decides to take it down.

UPDATE: The CDC did in fact

http://web.archive.org/web/20130522091608/http://www.cdc.gov/vaccinesafety/updates/archive/polio_and_cancer_factsheet.htm take

down the page on SV40 shortly after this post went viral, so the link now goes to an archived copy.

SV40 is a virus found in some species of monkey.

SV40 was discovered in 1960. Soon afterward, the virus was found in polio vaccine.

More than 98 million Americans received one or more doses of polio vaccine from 1955 to 1963 when a proportion of vaccine was

contaminated with SV40; it has been estimated that 10—30 million Americans could have received an SV40 contaminated dose of vaccine.

SV40 virus has been found in certain types of cancer in humans, but it has not been determined that SV40 causes these cancers.

The majority of scientific evidence suggests that SV40-contaminated vaccine did not cause cancer; however, some research results are

conflicting and more studies are needed.

Polio vaccines being used today do not contain SV40. All of the current evidence indicates that polio vaccines have been free of SV40 since

1963. Editor’s note: This claim by the CDC is false. SV40-contaminated oral polio vaccines were produced from early 1960s to about 1978

and were used throughout the world. http://www.ncbi.nlm.nih.gov/pubmed/16288015

In the 1950s, rhesus monkey kidney cells, which contain SV40 if the animal is infected, were used in preparing polio vaccines. Because SV40

was not discovered until 1960, no one was aware in the 1950s that polio vaccine could be contaminated.

SV40 was found in the injected form of the polio vaccine (IPV), not the kind given by mouth (OPV). (Editor’s note: this claim by the CDC is

patently false. SV40 was found in oral polio vaccines after 1961. A study determined that the procedure used by the manufacturer to

inactivate SV40 in oral polio-virus vaccine seed stocks based on heat inactivation in the presence of MgCl2 did not completely inactivate

SV40.).

http://www.ncbi.nlm.nih.gov/pubmed/16288015

Not all doses of IPV were contaminated. It has been estimated that 10—30 million people actually received a vaccine that contained SV40.

Some evidence suggests that receipt of SV40-contaminated polio vaccine may increase risk of cancer. However, the majority of studies done

in the U.S. and Europe which compare persons who received SV40-contaminated polio vaccine with those who did not have shown no causal

relationship between receipt of SV40-contaminated polio vaccine and cancer. (Editor’s note: Oh really? SV40 has already been detected in

some human tumors. That is far and beyond “some evidence”.)

polio vaccine Possibly more shocking than the fact that it took 50 years for the CDC to admit to this is that it took 3 years once SV40 was

discovered in 1960 to finally recall the tainted stock and reformulate the vaccine. Over 100 million Americans were vaccinated with the

contaminated polio vaccine before action was taken.

30 million seems like a very lowball number of the true extent of the problem!

With baby boomers suffering from cancer, by some estimates, at the mind boggling rate of 1 in every 3 individuals (up from 1 in 8,000 only a

few decades prior and the highest rate of any age group), it would seem that something is terribly amiss, don’t you think?

The government has a penchant for doling out bad news a little at a time to minimize public outrage. Even if the CDC does finally admit that

SV40 is a cause for this enormous explosion in cancer of boomers in their late 40’s, 50’s and 60’s, can these folks or their grieving families

do anything about it? = http://www.ncbi.nlm.nih.gov/pubmed/16288015

Nope. Can’t sue anyone my friends. Big Pharma is immune from prosecution from any injuries or deaths caused by their mad scientist

vaccination creations. This all thanks to the National Childhood Vaccine Injury Act of 1986.

One parting thought. The CDC insists that current polio vaccines no longer contain SV40. Should this give us some level of comfort?

Not for me it doesn’t! Just because SV40 is not in the polio vaccine stock today doesn’t mean that there aren’t other viruses lurking that

science doesn’t even know about yet. Remember that SV40 was in the polio vaccine for several years before it was even discovered!

Even if there were other viruses in the polio or any other vaccine, would the CDC admit it? Probably not – at least for 50 years or so after

the affected population was already sick, incapacitated or dead.

I’ll take my chances with a strong immune system maintained with Traditional Diet and the fact that epidemics were already on their way out

before vaccines were introduced anyway (see chart above – other communicable diseases follow the same graphical pattern regardless of

whether there was a vaccine for them or not. Click here http://www.dissolvingillusions.com/graphs/ for more graphs to help you get your

head out of the sand). Getting horses out of the streets, improved sanitation, clean running water in the home, availability of produce year

round and other improvements of modern technology and food distribution provide more protection from widespread epidemics than

tainted vaccines, thank you very much.

IMPORTANT UPDATE: The CDC took down its page on SV40 shortly after this post went viral. Fortunately, an internet archive site has the

information for you to see in full. Click here for the archived copy. The images are also provided below.

http://web.archive.org/web/20130522091608/http://www.cdc.gov/vaccinesafety/updates/archive/polio_and_cancer_factsheet.htm

polio vaccine = http://www.thehealthyhomeeconomist.com/wp-content/uploads/2013/07/polio-vaccine-page-1_mini.jpg

polio vaccine = http://www.thehealthyhomeeconomist.com/wp-content/uploads/2013/07/polio-vaccine-2_mini.jpg

Sarah, The Healthy Home Economist

Sources and More Information

Cancer, Simian Virus 40 (SV40), and Polio Vaccine Fact Sheet =

http://www.cdc.gov/vaccinesafety/updates/archive/polio_and_cancer_factsheet.htm

Some oral poliovirus vaccines were contaminated with infectious SV40 after 1961. =

http://www.ncbi.nlm.nih.gov/pubmed/16288015

CDC Admits as Many as 30 Million Americans Could be at Risk for Cancer Due to Polio Vaccine =

http://www.thelibertybeacon.com/2013/07/12/cdc-admits-as-many-as-30-million-americans-could-be-at-risk-for-cancer-due-to-polio-

vaccine/

Polio Poster from 1963 =

http://en.wikipedia.org/wiki/File:Polio_vaccine_poster.jpg

---------------------

they want us to accept this program

Unfortunately for the people of the world everything is going according to the New World Order Plan. But what is this New World Order

Plan? In a nutshell the Plan is this. The Dark Agenda of the secret planners of the New World Order is to reduce the world's population to a

"sustainable" level "in perpetual balance with nature" by a ruthless Population Control Agenda via Population and Reproduction Control. A

Mass Culling of the People via Planned Parenthood, toxic adulteration of water and food supplies, release of weaponised man-made viruses,

man-made pandemics, mass vaccination campaigns and a planned Third World War. Then, the Dark Agenda will impose upon the drastically

reduced world population a global feudal-fascist state with a World Government, World Religion, World Army, World Central Bank, World

Currency and a micro-chipped population. In short, to kill 90% of the world's population and to control all aspects of the human condition

and thus rule everyone, everywhere from the cradle to the grave.

WAKE THE FUCK UP PEOPLE Research everything while we still can

233766

52714

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~~~Council Of 13~~~

~Rothschild (Bauer or Bower) – Pindar

~Bruce

~Cavendish (Kennedy)

~De Medici

~Hanover

~Hapsburg

~Krupp

~Plantagenet

~Rockefeller

~Romanov

~Sinclair (St. Clair)

~Warburg (del Banco)

~Windsor (Saxe-Coburg-Gothe)

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

**Bohemian Grove Exposed**

“Anybody can be President of the United States, but very few can ever have any hope of becoming President of the Bohemian Club.” –

President Richard Nixon, 1972

They secretly meet for seventeen days each July in a remote “sacred grove” of ancient redwood trees in the deep forests surrounding San

Francisco. Some 1,500 in number, their membership roll is kept secret, but includes the super-rich, blood dynasty member families of the

Illuminati; heavy-hitting corporate chieftains and high government officials. Mingling among them are a number of Hollywood movie stars,

Broadway producers, famous entertainers, musicians, authors, painters and poets. Great statesmen and – so we’re told – gentlemen.

The names you’ll recognize: Former U.S. Presidents William Howard Taft, Calvin Coolidge, Herbert Hoover, Dwight Eisenhower, Richard

Nixon, Gerald Ford, Ronald Reagan, George Bush Sr. and Jr. Most of our present Bush administration’s top officials, such as Colin Powell, are

also members of this exclusive men’s club. California Governor Pete Wilson, the mayors of Los Angeles, San Francisco and other major

cities; astronauts Wally Schirra and Frank Borman; former FBI and CIA directors; former Secretaries of State George Schultz and Henry

Kissinger; international bankers; heads of big oil companies (ARCO, Mobil, Pennzoil, Texaco), and corporate CEO’s frolic in the redwoods

with some of the most famous creative people in history: Mark Twain, Ambrose Bierce, Bret Harte, Jack London, Will Rogers, Douglas

Fairbanks, Charlie Chaplin and Art Linkletter all “let their hair down” here.

Even Great Britain’s Queen Elizabeth showed up in 1983. Her Majesty was honored with an ecstatic pagan dance ceremony, complete with

expensive, elaborate stage props such as Egyptian pyramids and Babylonian ziggurats. Yet, even the Queen of England could not join this

club if she applied for membership. Why? Because this club is exclusively all male. Women have not ever been allowed since the club’s

founding in 1873.

So what is this ultra-elite club with the bizarre Druid customs? They are the Bohemians, formally known as the Bohemian Club. They

practically own their own county north of San Francisco, a 2,700-acre summer camp they call the Bohemian Grove. Since the 1890s, the

“Grover's” (as they are known to intimates) have gathered among these redwood trees to “get away from it all,” have a little summer

vacation fun, and avoid business dealings altogether for two weeks. At least, that’s the official story.

Then, there are the other stories…some of them too strange to believe. Tales of world leaders plotting the world’s destiny there in secret

“war rooms,” hand-picking Presidents and future leaders from the Bohemian Grove. Reports of occult rituals being conducted by these same

powerful men, clad only in hooded red, black and white robes, offering an effigy of a human being to be sacrificed by fire to a towering 45-

foot stone owl God, the “Great Owl of Bohemia” in a ceremony called “The Cremation of Care.” Sometimes, they discard the robes, don

women’s clothing and parade around onstage in theatrical productions or – if the spirit so moves them – they wear no clothes at all!

Things get even stranger still. Stories have come out of the Grove about wild homosexual orgies, male and female prostitutes being engaged

in what can only be described as extreme sexual games, young children being exploited in unspeakable ways, up to and including cold-

blooded ritual murder. There are stories involving actual human sacrifice on the “altar” of the owl God statue. Understandably, it’s all very

hard to believe.

But is any of it true? Does the Bohemian Grove emulate the ancient mystery cults of Babylon, Rome, and Greece? Do its members celebrate

the old Gods such as Molech, Ishtar, Lilith, Attis, Mithra, Apollo, Zoroaster, and others? Or is it a western secret society like the Freemasons

and Yale’s exclusive Skull and Bones? Are they just having “good clean fun” at the Grove? Or are they covertly plotting to take over the

world? Why do our world leaders meet here to share a fascination with the arts and all things Bohemian? Why the obsession with the occult

and ancient Babylon? This book proposes to answer many of the most frequently asked questions about Bohemian Grove, investigate the

rumors, fully document what is known to be true, and hopefully destroy a few misconceptions.

Closed to the public, sealed off by helicopters, a private security force, and armed guards, there can be no doubt that without the prying eyes

of the public upon them, the power elite may engage in whatever activities they wish at the Grove. Whether it’s crafting policy matters in

secret, dancing around in drag, cheating on their wives with prostitutes, taking drugs, practicing black magic, or even committing murder, the

pristine isolation of the Bohemian Grove provides a convenient cover for any immoral, illegal, or “un-gentlemanly” behavior one desires.

For most the club’s long history, the public could only speculate as to what these men were doing in there. Books and news articles about

the Bohemian Grove have been scarce; we could only rely on a little “leaked” information from insiders and the tireless work of a few

dedicated researchers and activists.

Now the truth can finally be revealed. Mike Hanson is a first-hand eyewitness who has been inside the Bohemian Grove. In the summer of

2000, Mike secretly “infiltrated” the Grove with radio talk show host Alex Jones. They filmed several hours of footage, including the entire

“Cremation of Care” ritual, which will be published in full here for the first time. He peers behind the deep, green foliage and twisted vines,

and the moss-covered brown limbs and trunks of ancient, gnarled trees to discover what really goes on at the Bohemian Grove.

Late Supreme Court Justice Antonin Scalia died during a meeting of an Austrian secret society founded by the Bohemian Grove as a feeder

group for the real Illuminati – and the resort hosting the society is filled with esoteric artwork.

During a visit to Cibolo Creek Ranch in Presidio Co., Texas, Scalia died among members of the U.S. chapter of the International Order of St.

Hubertus, which was launched in 1966 by associates of the Bohemian Grove which itself was a spin-off of the Order of the Bavarian

Illuminati founded in 1776 to counter both the American revolution and the emerging populist movements in Europe.

Did Scalia Die in Satanic Ceremony

Posted by Alex Jones on Thursday, February 25, 2016

“The Bavarian Illuminati’s own documents were intercepted by police many times – that’s why Encyclopedia Britannica breaks all this down

– and they revealed the Illuminati was planned to take over the renaissance and the big, burgeoning liberty movement taking place in

Europe and what became the United States,” Alex Jones revealed, who was the first to successfully infiltrate and film the Bohemian Grove.

“So they founded the Bavarian Illuminati that later created the Jacobins of the French Revolution to not create revolutions to overthrow the

corrupt monarchies and the church but to actually remove them and set themselves up as absolute rulers.”

“George Washington, in his famous anti-Illuminati letters before he died, talked about how they were trying to take over the Renaissance and

the liberty movement in Europe and the U.S. and how dangerous the French Revolution became by being run by these people.

“Once they had full control, they socially engineered the public to accept a dictator on the throne of France, which they did: Napoleon

Bonaparte,” he added.

And using Bonaparte, the Illuminati exploited France to invade other countries – and that’s the Illuminati model copied today by intelligence

agencies and George Soros-funded groups to overthrow Eastern European and Latin American governments.

“They come in, take over grassroots revolutions like the Arab Spring, put their own people in charge and then exploit the country they

dominated to take over the next country,” Jones continued. “That’s also how the communists operate because they came out of the Jacobins

and the French Revolution – Friedrich Engels and Karl Marx admitted that’s where they came from and they were only codifying the

Illuminati plan.”

In other words, the Illuminati model uses a false populist revolution to hijack countries from within.

Members of the Illuminati later founded Skull and Bones, the Yale University secret society, in 1832, and decades later, Skull and Bones

member and eventual U.S. President William H. Taft organized the modern-day Bohemian Grove around 1900 after he took it over from

American author Mark Twain, who disagreed with much of the esoteric ideology.

And the secret society that was at the resort when Scalia died grew out of the Bohemian Grove.

“This new group that we’re witnessing [the International Order of St. Hubertus] was a spin-off of Bohemian Grove, which itself was a spin-

off of Skull and Bones, and which itself was a spin-off of the Bavarian Illuminati,” Jones said.

The artwork filmed at the ranch by Infowars reveals the sinister ambiance surrounding Scalia during his last earthly hours.

For one thing, the late Justice likely ate his last meal in the ranch’s dining room that’s decorated with Illuminati-style esoteric masks, similar

to the masks seen in Stanley Kubrick’s Eyes Wide Shut.

redstatue

And an occultic statue stood just down the hallway where Scalia died.

Another creepy object here at the ranch. Has a Bohemian grove feel to it don't ya think

A photo posted by Rambo (@ssgbiggs) on Feb 17, 2016 at 9:15pm PST

There were also beds strangely placed in the hallway leading to Scalia’s suite where his body was found.

beds

Near the beds were bookshelves filled with books on statecraft, geopolitics and the rise and fall of historical empires, the abundance of

which seem out-of-place at a West Texas ranch.

Interestingly, most of the rooms at the ranch consist of twin beds not meant for married couples, suggesting the remote ranch was intended

more as a meeting place for fraternal orders than as a lodge for traveling families.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

----CIA/DHS/FBI/FEMA/NWO OPERATIONS----

links with _____example.com_____ are CIA, NSA, and FBI official documents.....

OPERATION PAPERCLIP

http://www.conspiracyarchive.com/NWO/project_paperclip.htm

http://www.operationpaperclip.info/

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mj12_17.htm

http://www.history.com/news/ask-history/what-was-operation-paperclip

https://www.jewishvirtuallibrary.org/jsource/ww2/OperationPaperclip.html

http://www.usatoday.com/story/life/books/2014/02/19/operation-paperclip-the-secret-intelligence-program-that-brought-nazi-

scientists-to-america/5561665/

http://nypost.com/2014/02/01/behind-the-secret-plan-to-smuggle-nazi-scientists-to-america/

https://www.youtube.com/watch?v=mPxGA11hcMU

__________*https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol-58-no-3/operation-

paperclip-the-secret-intelligence-program-to-bring-nazi-scientists-to-america.html*________

ARTHUR RUDOLPH

WERNHER VON BRAUN

KURT BLOME

MAJOR GENERAL WALTER SCHREIBER

HERMANN BECKER-FREYSING

SIEGFRIED RUFF

GENERAL REINHARD GEHLEN

KLAUS BARBIE

HEINRICH RUPP

LICIO GELLI

The CIA and the Vatican have rooted out all the religious establishments in the world.

The CIA has overthrown and set up dictators under their control all over the world.

The CIA and the Vatican have fulfilled the purpose of the Illuminati.

The CIA and the Vatican are the Illuminati.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MOCKINGBIRD

http://www.prisonplanet.com/analysis_louise_01_03_03_mockingbird.html

https://www.popularresistance.org/operation-mockingbird-cia-media-control-program/

http://www.groundzeromedia.org/operation-mockingbird-wake-up-psy-op/

http://whatreallyhappened.com/RANCHO/POLITICS/MOCK/mockingbird.php

http://spartacus-educational.com/JFKmockingbird.htm

https://www.youtube.com/watch?v=cDCfTIapds0

_________*https://www.cia.gov/open/Family%20Jewels.pdf*___________

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

THE TAVISTOCK AGENDA

http://tavistockagenda.iwarp.com/

https://gangstalkingsurfers.wordpress.com/2012/12/28/tavistock-agenda-revealed-fascist-america-2012/

https://cathki.wordpress.com/tag/tavistock-agenda/

http://educate-yourself.org/nwo/nwotavistockbestkeptsecret.shtml

http://mindcontrolfordummies.50megs.com/whats_new_20.html

http://tavistockagenda.weebly.com/introduction.html

http://fktv.is/the-tavistock-agenda-5921

http://beforeitsnews.com/alternative/2012/08/the-tavistock-agenda-the-elite-plan-revealed-2447902.html

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION CLOVERLEAF

http://themillenniumreport.com/2015/08/operation-cloverleaf-the-most-dangerous-weapons-testing-program-in-world-history/

http://www.whale.to/b/chemtrails.html

http://stopsprayingcalifornia.com/Operation-Cloverleaf.html

http://www.disclose.tv/forum/project-cloverleaf-chemtrails-and-their-purpose-t72795.html

http://morgellonsresearchgroup.com/project-cloverleaf-purpose-of-chemtrails/

https://www.youtube.com/watch?v=udEtOc2IFO8

https://chemtrailsinourskies.wordpress.com/tag/operation-cloverleaf/

http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=125x35649

http://beforeitsnews.com/chemtrails/2012/04/operation-cloverleaf-connection-to-disappearing-bees-food-shortages-and-animal-

extinctions-2024286.html

http://www.bibliotecapleyades.net/ciencia/ciencia_chemtrails28.htm

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MONARCH

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon02.htm

http://www.outpost-of-freedom.com/operatio.htm

http://www.strangerdimensions.com/2013/04/24/monarch-programming-and-mind-control/

http://conspiracy.wikia.com/wiki/Monarch_Mind_Control

http://vigilantcitizen.com/hidden-knowledge/origins-and-techniques-of-monarch-mind-control/

https://therearenosunglasses.wordpress.com/2008/09/19/educate-yourself-mind-control-the-ultimate-terror-operation-monarch/

https://archive.org/details/CIAandProjectMonarchFullHistoryRonPatton

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

D.U.M.B.S. DEEP UNDERGROUND MILITARY BASES

http://www.thetruthdenied.com/news/2012/12/14/deep-underground-military-base-d-u-m-b/

http://allnewspipeline.com/Walmart_Central_Command_For_Underground_Operations.php

http://www.thewatcherfiles.com/dumb.htm

https://www.youtube.com/watch?v=uEDAE_9v4h0

http://beforeitsnews.com/religion/2014/02/d-u-m-b-s-the-nephilim-within-deep-underground-military-bases-2464534.html

http://forum.prisonplanet.com/index.php?topic=216786.0

http://www.liveleak.com/view?i=c06_1362167820&comments=1

http://www.whale.to/b/underground_h.html

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MONGOOSE

https://www.maryferrell.org/pages/Operation_Mongoose.html

http://www.pbs.org/wgbh/amex/rfk/peopleevents/e_mongoose.html

https://www.marxists.org/history/cuba/subject/cia/mongoose/c-project.htm

http://www.globalsecurity.org/intell/ops/mongoose.htm

https://www.mtholyoke.edu/acad/intrel/cuba/mongoose.htm

http://mcadams.posc.mu.edu/mongoose.htm

http://spartacus-educational.com/JFKmongoose.htm

https://www.awesomestories.com/asset/view/OPERATION-MONGOOSE-Cuban-Missile-Crisis

_________*http://nsarchive.gwu.edu/nsa/cuba_mis_cri/620725%20Review%20of%20Op.%20Mongoose.pdf*_____________

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION WINDS

http://www.apfn.org/thewinds/arc_features/government/cia6-97.html

http://www.history.com/this-day-in-history/operation-frequent-wind-begins

http://www.navalhistory.org/2010/04/29/operation-frequent-wind-april-29-30-1975

http://www.todayifoundout.com/index.php/2014/03/last-gasp-vietnam-war-operation-frequent-wind/

https://www.youtube.com/watch?v=FuPZXF8OodU

http://www.operationeastwind.com/

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MK-DELTA

http://mindcontrolblackassassins.com/category/mk-delta/

https://en.wikipedia.org/wiki/Project_MKDELTA

http://www.apfn.org/thewinds/arc_features/government/cia6-97.html

https://wikispooks.com/wiki/Project_MKDELTA

https://www.youtube.com/watch?v=5gJl1HCVG3w

http://www.theforbiddenknowledge.com/hardtruth/mc_mkultra.htm

https://www.youtube.com/watch?v=spaxHTKHMOs

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon45.htm

http://www.thinkaboutit-ufos.com/category/government-projects/project-mkdelta/

________*http://documents.theblackvault.com/documents/intellipedia/intellipediamkultra.pdf*__________

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION NORTHWOODS

https://en.wikipedia.org/wiki/Operation_Northwoods

http://whatreallyhappened.com/WRHARTICLES/northwoods.html

http://abcnews.go.com/US/story?id=92662

http://www.wanttoknow.info/010501operationnorthwoods

http://911review.com/precedent/century/northwoods.html

http://www.ratical.org/ratville/CAH/Northwoods.html

http://nsarchive.gwu.edu/news/20010430/

http://www.rense.com/general18/harm.htm

_____________*http://nsarchive.gwu.edu/news/20010430/northwoods.pdf*_____________

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MIDNIGHT CLIMAX

http://www.sfweekly.com/sanfrancisco/operation-midnight-climax-how-the-cia-dosed-sf-citizens-with-lsd/Content?oid=2184385

https://en.wikipedia.org/wiki/Operation_Midnight_Climax

http://mediaroots.org/midnight-climax-sex-drugs-and-the-cia/

http://www.damninteresting.com/retired/operation-midnight-climax/

https://www.youtube.com/watch?v=x5bkcgh7w7k

http://boingboing.net/2012/03/17/midnight-climax-cias-mk-ult.html

http://www.druglibrary.org/schaffer/lsd/marks6.htm

http://io9.gizmodo.com/the-cia-once-ran-brothels-and-dosed-unsuspecting-custom-1687016854

http://ahrp.org/1953-1964-operation-midnight-climax-cias-lurid-ventures-into-sex-hookers-and-lsd/

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MK-NAOMI

http://www.nairaland.com/1158458/origin-aids-operation-mk-naomi

https://en.wikipedia.org/wiki/Project_MKNAOMI

http://www.truthistreason.net/pentagon-releases-mk-ultra-mk-naomi-documents

https://sites.google.com/site/bioterrorbible/GOV-TESTS--ATTACKS/project-naomi-1949-1969

http://www.voltairenet.org/article166027.html

https://www.youtube.com/watch?v=BCqo2B9N54o

https://www.youtube.com/watch?v=y272CkWK8vM

http://www.thewatcherfiles.com/cooper/aids.htm

http://tvnewslies.org/tvnl/index.php/editorial/guest-commentary/13873-writing-about-the-unspeakable-aids-and-bio-warfare.html

https://ritualabuse.us/mindcontrol/mc-documents-links/

http://forum.prisonplanet.com/index.php?topic=98240.0

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION MK-ULTRA

http://www.todayifoundout.com/index.php/2013/09/one-shocking-cia-programs-time-project-mkultra/

http://listverse.com/2015/05/28/10-real-victims-of-the-cias-mkultra-program/

https://en.wikipedia.org/wiki/Project_MKUltra

http://gizmodo.com/project-mkultra-one-of-the-most-shocking-cia-programs-1370236359

https://www.youtube.com/watch?v=7ff24-xGrSI

http://www.mindspring.com/~txporter/sec3.htm

http://rationalwiki.org/wiki/MKULTRA

https://jonrappoport.wordpress.com/2015/01/12/us-musicians-drafted-into-the-cias-mkultra/

http://www.wanttoknow.info/mind_control/cia_mind_control_experiments_sex_abuse

http://healthland.time.com/2012/03/23/the-legacy-of-the-cias-secret-lsd-experiments-on-america/

http://history.howstuffworks.com/history-vs-myth/cia-lsd1.htm

_______*http://www.foia.cia.gov/sites/default/files/document_conversions/89801/DOC_0000707674.pdf*__________

_______*https://info.publicintelligence.net/SSCI-MKULTRA-1977.pdf*________

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

CIA MLK ASSASSINATION

https://www.eff.org/deeplinks/2014/11/fbis-suicide-letter-dr-martin-luther-king-jr-and-dangers-unchecked-surveillance

http://newsone.com/2843790/did-you-know-us-govt-found-guilty-in-conspiracy-to-assassinate-dr-martin-luther-king-jr/

http://www.infowars.com/did-you-know-the-government-killed-martin-luther-king-jr/

http://readersupportednews.org/opinion2/275-42/16784-how-the-government-killed-martin-luther-king-jr

http://www.justice.gov/crt/vii-king-v-jowers-conspiracy-allegations

http://www.chicagoreader.com/chicago/the-conspiracy-to-kill-martin-luther-king/Content?oid=875281

https://www.youtube.com/watch?v=ssm_tOvH4IY

http://www.washingtonsblog.com/2015/01/martin-luther-king-assassinated-us-govt-king-family-civil-trial-verdict.html

http://www.globalresearch.ca/court-decision-u-s-government-agencies-found-guilty-in-martin-luther-kings-assassination/5320024

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION GLADIO

http://www.truthmove.org/content/operation-gladio/

https://www.youtube.com/watch?v=GGHXjO8wHsA

http://www.globalresearch.ca/operation-gladio-cia-network-of-stay-behind-secret-armies/9556

http://www.deepblacklies.co.uk/operation_gladio.htm

http://www.veteranstoday.com/2015/09/23/gladio/

http://www.thirdworldtraveler.com/CIA%20Hits/Gladio_CIAHits.html

https://en.wikipedia.org/wiki/Operation_Gladio

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

OPERATION GARDEN PLOT

The http://www.governmentattic.org/ website has posted four declassified documents on Operation Garden Plot, obtained under the Freedom of Information Act.

Infowars has yet to read the documents — in total, the documents are over a thousand pages.

Download PDF documents:

http://infowars.com/media/USArmyCivilDisturbPlanGardenPlot_1991.pdf

http://infowars.com/media/ArmyCivilDisturbPlanGardenPlot_1978.pdf

http://infowars.com/media/USAF-ROP355-10_GardenPlot_1968.pdf

http://infowars.com/media/DA-CivilDisturbPlanGardenPlot_1968.pdf

“Operation Garden Plot is a general U.S. Army and National Guard plan to respond to major domestic civil disturbances within the United States. The plan was

developed in response to the civil disorders of the 1960s and is now under the control of the U.S. Northern Command (NORTHCOM). It provides Federal military and

law enforcement assistance to local governments during times of major civil disturbances,” according to a Wikipedia write-up.

Operation Garden Plot is a subprogram of Rex 84 Program, short for Readiness Exercise 1984, the military’s plan to impose martial law and intern dissidents and

others in an undisclosed number of concentration camps. The existence of Rex 84 was first revealed during the Iran-Contra Hearings in 1987 and reported by the

Miami Herald on July 5, 1987.

Frank Morales comments on Operation Garden Plot:

"Ominously, many assume that the training of military and police forces to suppress “outlawed” behavior of citizens, along with the creation of extensive and

sophisticated “emergency” social response networks set to spring into action in the event of “civil unrest”, is prudent and acceptable in a democracy. And yet, does not

this assumption beg the question as to what civil unrest is? One could argue for example, that civil disturbance is nothing less than democracy in action, a message to

the powers-that-be that the people want change. In this instance “disturbing behavior” may actually be the exercising of ones’ right to resist oppression. Unfortunately,

the American corporate/military directorship, which has the power to enforce its’ definition of “disorder”, sees democracy as a threat and permanent counter-

revolution as a “national security” requirement.

The elite military/corporate sponsors of Garden Plot have their reasons for civil disturbance contingency planning. Lets’ call it the paranoia of the thief. Their rationale

is simple: self-preservation. Fostering severe and targeted “austerity”, massive inequality and unbridled greed, while shifting more and more billions to the generals

and the rich, the de-regulated “entities of force” and their interlocking corporate directors know quite well what their policies are engendering, namely, a growing

resistance. Consequently, they are systematically organizing to protect their interests, their profits, and their criminal conspiracies. To this end, they are rapidly

consolidating an infrastructure of repression designed to “suppress rebellion” against their “authority”. Or more conveniently put, to suppress “rebellion against the

authority of the United States.” And so, as the Pentagon Incorporated increases its imperialist violence around the world, the chickens have indeed come home to roost

here in America in the form of a national security doctrine obsessed with domestic “insurgency” and the need to pre-emptively neutralize it. Its’ code-name: “Garden

Plot”.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

THE PLAME AFFAIR

http://www.discoverthenetworks.org/viewSubCategory.asp?id=32

http://www.thenation.com/article/plamegate-finale-we-were-right-they-were-wrong/

http://www.theguardian.com/world/2005/oct/28/usa

http://www.thenewamerican.com/reviews/opinion/item/10903-the-truth-about-the-valerie-plame-case-finally-emerges

http://www.larouchepub.com/other/2005/3228rove_cheney_plame.html

http://www.washingtonpost.com/wp-srv/politics/special/plame/Plame_KeyPlayers.html

https://www.corbettreport.com/plamegate-revisited-who-really-leaked-valerie-plames-cover-2/

http://www.washingtonpost.com/wp-dyn/content/article/2005/10/20/AR2005102001487.html

http://rationalwiki.org/wiki/Valerie_Plame_Affair

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Bill H.R. 347

The bill, H.R. 347, has been variously described as making the First Amendment illegal or criminalizing the Occupy protests.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

FISA

The Foreign Intelligence Surveillance Act of 1978

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

U.S.S. LIBERTY

https://en.wikipedia.org/wiki/USS_Liberty_incident

http://whatreallyhappened.com/WRHARTICLES/ussliberty.html

http://www.wrmea.org/1993-june/the-assault-on-the-uss-liberty-still-covered-up-after-26-years.html

http://www.rense.com/general39/pilot.htm

http://www.jewishvirtuallibrary.org/jsource/History/liberty1.html

http://www.ifamericansknew.org/us_ints/ussliberty.html

http://www.chicagotribune.com/chi-liberty_tuesoct02-story.html

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

THE REX 84 PROGRAM

The Rex 84 Program was established on the reasoning that if a "mass exodus" of illegal aliens crossed the Mexican/US border, they would be quickly rounded up and

detained in detention centers by FEMA. Rex 84 allowed many military bases to be closed down and to be turned into prisons.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

CISPA

The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a proposed law in the

United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

ECHELON

America's Secret Global Surveillance Network

by Patrick S. Poole

1999/2000

from ECHELONResearchResources Website

recovered through WayBackMachine Website

Executive Summary

In the greatest surveillance effort ever established, the US National Security Agency (NSA) has created a global spy system, codename ECHELON, which captures and

analyzes virtually every phone call, fax, email and telex message sent anywhere in the world.

ECHELON is controlled by the NSA and is operated in conjunction with,

the Government Communications Head Quarters (GCHQ) of England

the Communications Security Establishment (CSE) of Canada

the Australian Defense Security Directorate (DSD)

the General Communications Security Bureau (GCSB) of New Zealand

These organizations are bound together under a secret 1948 agreement, UKUSA, whose terms and text remain under wraps even today.

The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications

traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition

(OCR) programs, and look for code words or phrases (known as the ECHELON “Dictionary”) that will prompt the computers to flag the message for recording and

transcribing for future analysis.

Intelligence analysts at each of the respective “listening stations” maintain separate keyword lists for them to analyze any conversation or document flagged by the

system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.

But apart from directing their ears towards terrorists and rogue states, ECHELON is also being used for purposes well outside its original mission.

The regular discovery of domestic surveillance targeted at American civilians for reasons of “unpopular” political affiliation or for no probable cause at all in violation

of the First, Fourth and Fifth Amendments of the Constitution - are consistently impeded by very elaborate and complex legal arguments and privilege claims by the

intelligence agencies and the US government.

The guardians and caretakers of our liberties, our duly elected political representatives, give scarce attention to these activities, let alone the abuses that occur under

their watch.

Among the activities that the ECHELON targets are:

Political spying:

Since the close of World War II, the US intelligence agencies have developed a consistent record of trampling the rights and liberties of the American people.

Even after the investigations into the domestic and political surveillance activities of the agencies that followed in the wake of the Watergate fiasco, the NSA continues

to target the political activity of “unpopular” political groups and our duly elected representatives. One whistleblower charged in a 1988 Cleveland Plain Dealer

interview that, while she was stationed at the Menwith Hill facility in the 1980s, she heard real-time intercepts of South Carolina Senator Strom Thurmond.

A former Maryland Congressman, Michael Barnes, claimed in a 1995 Baltimore Sun article that under the Reagan Administration his phone calls were regularly

intercepted, which he discovered only after reporters had been passed transcripts of his conversations by the White House. One of the most shocking revelations came

to light after several GCHQ officials became concerned about the targeting of peaceful political groups and told the London Observer in 1992 that the ECHELON

dictionaries targeted Amnesty International, Greenpeace, and even Christian ministries.

Commercial espionage:

Since the demise of Communism in Eastern Europe, the intelligence agencies have searched for a new justification for their surveillance capability in order to protect

their prominence and their bloated budgets.

Their solution was to redefine the notion of national security to include economic, commercial and corporate concerns. An office was created within the Department of

Commerce, the Office of Intelligence Liaison, to forward intercepted materials to major US corporations.

In many cases, the beneficiaries of this commercial espionage effort are the very companies that helped the NSA develop the systems that power the ECHELON

network.

This incestuous relationship is so strong that sometimes this intelligence information is used to push other American manufacturers out of deals in favor of these

mammoth US defense and intelligence contractors, who frequently are the source of major cash contributions to both political parties.

While signals intelligence technology was helpful in containing and eventually defeating the Soviet Empire during the Cold War, what was once designed to target a

select list of communist countries and terrorist states is now indiscriminately directed against virtually every citizen in the world.

The European Parliament is now asking whether the ECHELON communications interceptions violate the sovereignty and privacy of citizens in other countries. In some

cases, such as the NSA’s Menwith Hill station in England, surveillance is conducted against citizens on their own soil and with the full knowledge and cooperation of

their government.

This report suggests that Congress pick up its long-neglected role as watchdog of the Constitutional rights and liberties of the American people, instead of its current

role as lap dog to the US intelligence agencies.

Congressional hearings ought to be held, similar to the Church and Rockefeller Committee hearings held in the mid-1970s, to find out to what extent the ECHELON

system targets the personal, political, religious, and commercial communications of American citizens. The late Senator Frank Church warned that the technology and

capability embodied in the ECHELON system represented a direct threat to the liberties of the American people.

Left unchecked, ECHELON could be used by either the political elite or the intelligence agencies themselves as a tool to subvert the civil protections of Constitution and

to destroy representative government in the United States.

Introduction

The culmination of the Cold War conflict brought home hard realities for many military and intelligence agencies who were dependent upon the confrontation for

massive budgets and little civilian oversight.

World War II Allied political and military alliances had quickly become intelligence alliances in the shadow of the Iron Curtain that descended upon Eastern Europe

after the war.

But for some intelligence agencies the end of the Cold War just meant a shift in mission and focus, not a loss of manpower or financial resources. One such US

governmental organization is the National Security Agency (NSA).

Despite the disintegration of Communism in the former Soviet Union and throughout Eastern Europe, the secretive NSA continues to grow at an exponential rate in

terms of budget, manpower and spying abilities.

Other countries have noticed the rapid growth of NSA resources and facilities around the world, and have decried the extensive spying upon their citizens by the US.

A preliminary report released by the European Parliament in January 1998 detailed research conducted by independent researchers that uncovered a massive US spy

technology network that routinely monitors telephone, fax and email information on citizens all over the world, but particularly in the European Union (EU) and Japan.

Titled “An Appraisal of Technologies of Political Control,” <1> this report, issued by the Scientific and Technological Options Assessment (STOA) committee of the

European Parliament, caused a tremendous stir in the establishment press in Europe.

At least one major US media outlet, The New York Times,<2> covered the issuance of the report as well.

The STOA report also exposed a festering sore spot between the US and our EU allies. The widespread surveillance of citizens in EU countries by the NSA has been

known and discussed by European journalists since 1981. The name of the system in question is ECHELON, and it is one of the most secretive spy systems in existence.

ECHELON is actually a vast network of electronic spy stations located around the world and maintained by five countries: the US, England, Canada, Australia, and New

Zealand. These countries, bound together in a still-secret agreement called UKUSA, spy on each other’s citizens by intercepting and gathering electronic signals of

almost every telephone call, fax transmission and email message transmitted around the world daily.

These signals are fed through the massive supercomputers of the NSA to look for certain keywords called the ECHELON “dictionaries.”

Most of the details of this mammoth spy system and the UKUSA agreement that supports it remain a mystery. What is known of ECHELON is the result of the efforts of

journalists and researchers around the world who have labored for decades to uncover the operations of our government’s most secret systems.

The 1996 publication of New Zealand journalist Nicky Hager’s book, Secret Power: New Zealand’s Role in the International Spy Network,<3> provided the most

detailed look at the system and inflamed interest in ECHELON as well as the debate regarding its propriety.

This paper examines the expanse of the ECHELON system along with the intelligence agreements and exchanges that support it. The operation of ECHELON serves the

NSA’s goal of spying on the citizens of other countries while also allowing them to circumvent the prohibition on spying on US citizens. ECHELON is not only a gross

violation of our Constitution, but it violates the good will of our European allies and threatens the privacy of innocent civilians around the world.

The existence and expansion of ECHELON is a foreboding omen regarding the future of our Constitutional liberties.

If a government agency can willingly violate the most basic components of the Bill of Rights without so much as Congressional oversight and approval, we have

reverted from a republican form of government to tyranny.

The Parties

The success of the Allied military effort in World War II was due in no small part to successes in gathering enemy intelligence information and cracking those military

and diplomatic messages.

In addition, the Allied forces were able to create codes and encryption devices that effectively concealed sensitive information from prying Axis Power eyes. These

coordinated signal intelligence (SIGINT) programs kept Allied information secure and left the enemies vulnerable.

But at the close of the conflict, a new threatening power - the Soviet Union - was beginning to provoke the Cold War by enslaving Eastern Europe. These signal

intelligence agencies now had a new enemy toward which to turn their electronic eyes and ears to ensure that the balance of power could be maintained. The volleys

of electronic hardware and espionage that would follow for forty years would be the breeding ground of the ECHELON spy system.

The diplomatic foundation that was the genesis of ECHELON is the UKUSA agreement. The agreement has its roots in the BRUSA COMINT (communications intelligence)

alliance formed in the early days of World War II and ratified on May 17, 1943 by the United Kingdom and the United States.<4>

The Commonwealth SIGINT Organization formed in 1946-47 brought together the UK, Canada, Australia and New Zealand post-war intelligence agencies.<5>

Forged in 1947 between the US and UK, the still-secret UKUSA agreement defined the relations between the SIGINT departments of those various governments. Direct

agreements between the US and these agencies also define the intricate relationship that these organizations engage in.

Foremost among those agencies is the US National Security Agency (NSA), which represents the American interest. The NSA is designated as the “First Party to the

Treaty.”

The Government Communications Headquarters (GCHQ) signed the UKUSA agreement on behalf of the UK and its Commonwealth SIGINT partners.

This brought Australia’s Defense Signals Directorate (DSD), the Canadian Communications Security Establishment (CSE) and New Zealand’s Government

Communications Security Bureau (GCSB) into the arrangement. While these agencies are bound by additional direct agreements with the US and each other, these four

countries are considered the “Second Parties to the (UKUSA) Treaty.”

Third Party members include Germany, Japan, Norway, South Korea and Turkey. There are sources that indicate China may be included in this group on a limited basis

as well.<6>

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

National Security Agency (US)

The prime mover in the UKUSA arrangement is undeniably the National Security Agency (NSA).

The majority of funds for joint projects and facilities (discussed below) as well as the direction for intelligence gathering operations are issued primarily through the

NSA.

The participating agencies frequently exchange personnel, divide up intelligence collection tasks and establish common guidelines for classifying and protecting shared

information. However, the NSA utilizes its role as the largest spy agency in the world to have its international intelligence partners do its bidding.

President Harry Truman established the NSA in 1952 with a presidential directive that remains classified to this day. The US government did not acknowledge the

existence of the NSA until 1957. Its original mission was to conduct the signal intelligence (SIGINT) and communications security (COMSEC) for the US.

President Ronald Reagan added the tasks of information systems security and operations security training in 1984 and 1988 respectively. A 1986 law charged the NSA

with supporting combat operations for the Department of Defense.<7>

Headquartered at Fort George Meade, located between Washington D.C. and Baltimore, Maryland, the NSA boasts the most enviable array of intelligence equipment

and personnel in the world. The NSA is the largest global employer of mathematicians, featuring the best teams of code-makers and code-breakers ever assembled.

The latter’s job is to crack the encryption codes of foreign and domestic electronic communications, forwarding the revealed messages to their enormous team of

skilled linguists to review and analyze the messages in over 100 languages. The NSA is also responsible for creating the encryption codes that protect the US

government’s communications.

In its role as gang leader for UKUSA, the NSA is primarily involved with creating new surveillance and codebreaking technology, directing the other cooperating

agencies to their targets, and providing them with training and tools to intercept, process and analyze enormous amounts of signals intelligence.

By possessing what is arguably the most technologically advanced communications, computer and codebreaking equipment of any government agency in the world,

the NSA serves as a competent and capable taskmaster for UKUSA.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

The ECHELON Network

The vast network created by the UKUSA community stretches across the globe and into the reaches of space.

Land-based intercept stations, intelligence ships sailing the seven seas and top-secret satellites whirling twenty thousand miles overhead all combine to empower the

NSA and its UKUSA allies with access to the entire global communications network. Very few signals escape its electronic grasp.

Having divided the world up among the UKUSA parties, each agency directs its electronic "vacuum-cleaner" equipment towards the heavens and the ground to search

for the most minute communications signals that traverse the system’s immense path.

the NSA facilities in the US cover the communications signals of both American continents

the GCHQ in Britain is responsible for Europe, Africa and Russia west of the Ural Mountains

the DSD in Australia assists in SIGINT collection in Southeastern Asia and the Southwest Pacific and Eastern Indian Ocean areas

the GSCB in New Zealand is responsible for Southern Pacific Ocean collections, particularly the South Pacific island nations group

the CSE in Canada handles interception of additional northern Russian, northern European and American communications.<8>

The Facilities

The backbone of the ECHELON network is the massive listening and reception stations directed at the Intelsat and Inmarsat satellites that are responsible for the vast

majority of phone and fax communications traffic within and between countries and continents.

The twenty Intelsat satellites follow a geo-stationary orbit locked onto a particular point on the Equator.<9>

These satellites carry primarily civilian traffic, but they do additionally carry diplomatic and governmental communications that are of particular interest to the UKUSA

parties.

Originally, only two stations were responsible for Intelsat intercepts: Morwenstow in England and Yakima in the state of Washington. However, when the Intelsat 5

series was replaced with the Intelsat 701 and 703 satellites, which had much more precise transmission beams that prohibited reception of Southern Hemisphere

signals from the Yakima base in the Northern Hemisphere, additional facilities were constructed in Australia and New Zealand.<10>

Today, the Morwenstow station directs its ears towards the Intelsats traversing the atmosphere above the Atlantic and Indian Oceans and transmitting to Europe,

Africa and western parts of Asia. The Yakima station, located on the grounds of the Yakima Firing Station, targets Pacific Ocean communications in the Northern

Hemisphere as well as the Far East.

Another NSA facility at Sugar Grove, West Virginia, covers traffic for the whole of North and South America.

A DSD station at Geraldton, Australia, and the Waihopai, New Zealand GCSB facility cover Asia, the South Pacific countries and the Pacific Ocean. An additional station

on Ascension Island in the Atlantic Ocean between Brazil and Angola is suspected of covering the Atlantic Intelsat’s Southern Hemisphere communications.<11>

Non-Intelsat satellites are monitored from these same stations, as well as from bases in Menwith Hill, England; Shoal Bay, Australia; Leitrim, Canada; Bad Aibling,

Germany, and Misawa, Japan. These satellites typically carry Russian and regional communications.<12>

It is known that the Shoal Bay facility targets a series of Indonesian satellites and that the Leitrim station intercepts communications from Latin American satellites,

including the Mexican telephone company’s Morelos satellite.<13>

Several dozen other radio listening posts operated by the UKUSA allies dot the globe as well, located at military bases on foreign soil and remote spy posts. These

stations played a critical role in the time prior to the development of satellite communications because much of the world’s communications traffic was transmitted on

radio frequency bands.

Particularly in the high-frequency (HF) range, radio communications continue to serve an important purpose despite the widespread use of satellite technology

because their signals can be transmitted to military ships and aircraft across the globe. Shorter range very high-frequencies (VHF) and ultra high-frequencies (UHF)

are also used for tactical military communications within national borders.

Major radio facilities in the UKUSA network include,

Tangimoana, New Zealand

Bamaga, Australia

the joint NSA/GCHQ facility at the Indian Ocean atoll of Diego Garcia <14>

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

UK facilities

A separate high frequency direction finding (HFDF) network intercepts communications signals for the unique purpose of locating the position of ships and aircraft.

While these stations are not actually involved in the analysis of messages, they play a critical role in monitoring the movements of mobile military targets.

The Canadian CSE figures prominently in the HFDF UKUSA network, codenamed CLASSIC BULLSEYE and hosting a major portion of the Atlantic and Pacific stations

that monitored Soviet ship and submarine movements during the Cold War.

Stations from Kingston and Leitrim (Ontario) to Gander (Newfoundland) on the Atlantic side, to Alert (Northwest Territories) located at the northernmost tip of

Canada on the Arctic Ocean that listens to the Russian submarine bases at Petropavlovsk and Vladivostok, and finally to Masset (British Columbia) in the Pacific -

monitor shipping and flight lanes under the direction of the NSA.<15>

The CSE also maintains a small contingent at Lackland Air Force Base in San Antonio, Texas, which probably monitors Latin American communications targets.

Another major support for the ECHELON system is the US spy satellite network and its corresponding reception bases scattered about the UKUSA empire. These

space-based electronic communications "vacuum cleaners" pick up radio, microwave and cell phone traffic on the ground.

They were launched by the NSA in cooperation with its sister spy agencies, the National Reconnaissance Office (NRO) and the Central Intelligence Agency (CIA).

The Ferret series of satellites in the 1960s

The Canyon, Rhyolite and Aquacade satellites in the 1970s

The Chalet, Vortex, Magnum, Orion, and Jumpseat series of satellites in the 1980s,

...have given way to the new and improved Mercury, Mentor and Trumpet satellites during the 1990s.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Table I. US Spy Satellites in Current Use

Satellite

No.

Orbit

Manufacturer

Purpose

Advanced KH-11

3

200 miles

Lockheed Martin

5-inch resolution spy photographs

LaCrosse Radar Imaging

2

200-400 miles

Lockheed Martin

3 to 10-foot resolution spy photographs

Orion/Vortex

3

22,300 miles

TRW

Telecom surveillance

Trumpet

2

200-22,300 miles

Boeing

Surveillance of cellular phones

Parsae

3

600 miles

TRW

Ocean surveillance

Satellite Data Systems

2

200-22,300 miles

Hughes

Data Relay

Defense Support Program

4+

22,300 miles

TRW/Aerojet

Missile early warning

Defense Meteorological Support Program

2

500 miles

Lockheed Martin

Meteorology, nuclear blast detection

Source: MSNBC<16>

These surveillance satellites act as giant scoops picking up electronic communications, cell phone conversations and various radio transmissions.

The downlink stations that control the operations and targeting of these satellites are under the exclusive control of the United States, despite their location on foreign

military bases.

The two primary downlink facilities are at Menwith Hill, England, and Pine Gap, Australia.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Inside Menwith Hill

The Menwith Hill facility is located in North Yorkshire near Harrogate, England.

The important role that Menwith Hill plays in the ECHELON system was recognized by the recent European Parliament STOA report:

Within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information

from the European mainland via the strategic hub of London then by satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of

the UK.<17>

The existence and importance of the facility was first brought to light by British journalist and researcher Duncan Campbell in 1980.<18>

Today, it is the largest spy station in the world, with over twenty-five satellite receiving stations and 1,400 American NSA personnel working with 350 UK Ministry of

Defense staff on site.

After revelations that the facility was coordinating surveillance for the vast majority of the European continent, the base has become a target for regular protests

organized by local peace activists. It has also become the target of intense criticism by European government officials who are concerned about the vast network of

civilian surveillance and economic espionage conducted from the station by the US.<19>

The beginnings of Menwith Hill go back to December 1951, when the US Air Force and British War Office signed a lease for land that had been purchased by the British

government.

The NSA took over the lease of the base in 1966, and they have continued to build up the facility ever since. Up until the mid-1970s, Menwith Hill was used for

intercepting International Leased Carrier (ILC) and Non-Diplomatic Communications (NDC).

Having received one of the first sophisticated IBM computers in the early 1960s, Menwith Hill was also used to sort through the voluminous unenciphered telex

communications, which consisted of international messages, telegrams and telephone calls from the government, business and civilian sectors looking for anything of

political, military or economic value.<20>

The addition of the first satellite intercept station at Menwith Hill in 1974 raised the base’s prominence in intelligence gathering. Eight large satellite communications

dishes were installed during that phase of construction.

Several satellite-gathering systems now dot the facility:<21>

STEEPLEBUSH - Completed in 1984, this $160 million system expanded the satellite surveillance capability and mission of the spy station beyond the bounds of the

installation that began in 1974.

RUNWAY - Running east and west across the facility, this system receives signals from the second-generation geosynchronous Vortex satellites, and gathers

miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for

processing. RUNWAY may have recently been replaced or complemented by another system, RUTLEY.

PUSHER - An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio

devices). Military, embassy, maritime and air flight communications are the main target of PUSHER.

MOONPENNY - Uncovered by British journalist Duncan Campbell in the 1980s, this system is targeted at the communication relay satellites belonging to other

countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II - The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 - A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or

Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II - An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering

traffic from the Vortex satellites.

SILKWORTH - Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception

systems.

One shocking revelation about Menwith Hill came to light in 1997 during the trial of two women peace campaigners appealing their convictions for trespassing at the

facility.

In documents and testimony submitted by British Telecomm in the case, R.G. Morris, head of Emergency Planning for British Telecomm, revealed that at least three

major domestic fiber-optic telephone trunk lines - each capable of carrying 100,000 calls simultaneously - were wired through Menwith Hill.<22>

This allows the NSA to tap into the very heart of the British Telecomm network.

Judge Jonathan Crabtree rebuked British Telecomm for his revelations and prohibited Mr. Morris from giving any further testimony in the case for “national security”

reasons.

According to Duncan Campbell, the secret spying alliance between Menwith Hill and British Telecomm began in 1975 with a coaxial connection to the British Telecomm

microwave facility at Hunter’s Stone, four miles away from Menwith Hill - a connection maintained even today.<23>

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill.

Directing its electronic vacuum cleaners towards unsuspecting communications satellites in the skies, receiving signals gathered by satellites that scoop up the most

minute signals on the ground, listening in on the radio communications throughout the air, or plugging into the ground-based telecommunications network, Menwith

Hill, alongside its sister stations at Pine Gap, Australia, and Bad Aibling, Germany, represents the comprehensive effort of the NSA and its UKUSA allies to make sure

that no communications signal escapes its electronic net.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

The ECHELON Dictionaries

The extraordinary ability of ECHELON to intercept most of the communications traffic in the world is breathtaking in its scope.

And yet the power of ECHELON resides in its ability to decrypt, filter, examine and codify these messages into selective categories for further analysis by intelligence

agents from the various UKUSA agencies.

As the electronic signals are brought into the station, they are fed through the massive computer systems, such as Menwith Hill’s SILKWORTH, where voice recognition,

optical character recognition (OCR) and data information engines get to work on the messages.

These programs and computers transcend state-of-the-art; in many cases, they are well into the future. MAGISTRAND is part of the Menwith Hill SILKWORTH super-

computer system that drives the powerful keyword search programs.<24>

One tool used to sort through the text of messages, PATHFINDER (manufactured by the UK company, Memex),<** Be sure to read footnote for update 25 **> sifts

through large databases of text-based documents and messages looking for keywords and phrases based on complex algorithmic criteria. Voice recognition programs

convert conversations into text messages for further analysis.

One highly advanced system, VOICECAST, can target an individual’s voice pattern, so that every call that person makes is transcribed for future analysis.

Processing millions of messages every hour, the ECHELON systems churn away 24 hours a day, 7 days a week, looking for targeted keyword series, phone and fax

numbers, and specified voiceprints. It is important to note that very few messages and phone calls are actually transcribed and recorded by the system.

The vast majority are filtered out after they are read or listened to by the system. Only those messages that produce keyword “hits” are tagged for future analysis.

Again, it is not just the ability to collect the electronic signals that gives ECHELON its power; it is the tools and technology that are able to whittle down the messages to

only those that are important to the intelligence agencies.

Each station maintains a list of keywords (the “Dictionary”) designated by each of the participating intelligence agencies. A Dictionary Manager from each of the

respective agencies is responsible for adding, deleting or changing the keyword search criteria for their dictionaries at each of the stations.<26>

Each of these station dictionaries are given codewords, such as COWBOY for the Yakima facility and FLINTLOCK for the Waihopai facility.<27> These codewords play a

crucial identification role for the analysts who eventually look at the intercepted messages.

Each message flagged by the ECHELON dictionaries as meeting the specified criteria is sorted by a four-digit code representing the source or subject of the message

(such as 5535 for Japanese diplomatic traffic, or 8182 for communications about distribution of encryption technology,) <28> as well as the date, time and station

codeword.

Also included in the message headers are the codenames for the intended agency: ALPHA-ALPHA (GCHQ), ECHO-ECHO (DSD), INDIA-INDIA (GCSB), UNIFORM-

UNIFORM (CSE), and OSCAR-OSCAR (NSA).

These messages are then transmitted to each agency’s headquarters via a global computer system, PLATFORM,<29> that acts as the information nervous system for

the UKUSA stations and agencies.

Every day, analysts located at the various intelligence agencies review the previous day’s product. As it is analyzed, decrypted and translated, it can be compiled into

the different types of analysis: reports, which are direct and complete translations of intercepted messages; “gists,” which give basic information on a series of

messages within a given category; and summaries, which are compilations from both reports and gists.<30>

These are then given classifications: MORAY (secret), SPOKE (more secret than MORAY), UMBRA (top secret), GAMMA (Russian intercepts) and DRUID (intelligence

forwarded to non-UKUSA parties).

This analysis product is the raison d’être of the entire ECHELON system. It is also the lifeblood of the UKUSA alliance.

The Problem

The ECHELON system is the product of the Cold War conflict, an extended battle replete with heightened tensions that teetered on the brink of annihilation and the

diminished hostilities of détente and glasnost.

Vicious cycles of mistrust and paranoia between the United States and the Soviet Empire fed the intelligence agencies to the point that, with the fall of communism

throughout Eastern Europe, the intelligence establishment began to grasp for a mission that justified its bloated existence.

But the rise of post-modern warfare - terrorism - gave the establishment all the justification it needed to develop even greater ability to spy on our enemies, our allies

and our own citizens. ECHELON is the result of those efforts. The satellites that fly thousands of miles overhead and yet can spy out the most minute details on the

ground; the secret submarines that troll the ocean floors that are able to tap into undersea communications cables;<31> and all power the efficient UKUSA signals

intelligence machine.

There is a concerted effort by the heads of intelligence agencies, federal law enforcement officials and congressional representatives to defend the capabilities of

ECHELON. Their persuasive arguments point to the tragedies seen in the bombings in Oklahoma City and the World Trade Center in New York City.

The vulnerability of Americans abroad, as recently seen in the bombing of the American embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya, emphasizes the

necessity of monitoring those forces around the world that would use senseless violence and terror as political weapons against the US and its allies.

Intelligence victories add credibility to the arguments that defend such a pervasive surveillance system.

The discovery of missile sites in Cuba in 1962, the capture of the Achille Lauro terrorists in 1995, the discovery of Libyan involvement in the bombing of a Berlin

discotheque that killed one American (resulting in the 1996 bombing of Tripoli) and countless other incidents that have been averted (which are now covered by the

silence of indoctrination vows and top-secret classifications) all point to the need for comprehensive signals intelligence gathering for the national security of the

United States.

But despite the real threats and dangers to the peace and protection of American citizens at home and abroad, our Constitution is quite explicit in limiting the scope

and powers of government.

A fundamental foundation of free societies is that when controversies arise over the assumption of power by the state, power never defaults to the government, nor

are powers granted without an extraordinary, explicit and compelling public interest.

As the late Supreme Court Justice William Brennan pointed out:

The concept of military necessity is seductively broad, and has a dangerous plasticity. Because they invariably have the visage of overriding importance, there is always

a temptation to invoke security “necessities” to justify an encroachment upon civil liberties.

For that reason, the military-security argument must be approached with a healthy skepticism: Its very gravity counsels that courts be cautious when military necessity

is invoked by the Government to justify a trespass on [Constitutional] rights.<32>

Despite the necessity of confronting terrorism and the many benefits that are provided by the massive surveillance efforts embodied by ECHELON, there is a dark and

dangerous side of these activities that is concealed by the cloak of secrecy surrounding the intelligence operations of the United States.

The discovery of domestic surveillance targeting American civilians for reasons of “unpopular” political affiliation - or for no probable cause at all - in violation of the

First, Fourth and Fifth Amendments of the Constitution is regularly impeded by very elaborate and complex legal arguments and privilege claims by the intelligence

agencies and the US government.

The guardians and caretakers of our liberties - our duly elected political representatives - give scarce attention to the activities, let alone the abuses, that occur under

their watch. As pointed out below, our elected officials frequently become targets of ECHELON themselves, chilling any effort to check this unbridled power.

In addition, the shift in priorities resulting from the demise of the Soviet Empire and the necessity to justify intelligence capabilities resulted in a redefinition of

“national security interests” to include espionage committed on behalf of powerful American companies.

This quiet collusion between political and private interests typically involves the very same companies that are involved in developing the technology that empowers

ECHELON and the intelligence agencies.

Domestic and Political Spying

When considering the use of ECHELON on American soil, the pathetic historical record of NSA and CIA domestic activities in regards to the Constitutional liberties and

privacy rights of American citizens provides an excellent guidepost for what may occur now with the ECHELON system.

Since the creation of the NSA by President Truman, its spying capability has frequently been used to monitor the activities of an unsuspecting public.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Project SHAMROCK

In 1945 Project SHAMROCK was initiated to obtain copies of all telegraphic information exiting or entering the United States.

With the full cooperation of RCA, ITT and Western Union (representing almost all of the telegraphic traffic in the US at the time), the NSA’s predecessor and later the

NSA itself were provided with daily microfilm copies of all incoming, outgoing and transiting telegraphs.

This system changed dramatically when the cable companies began providing magnetic computer tapes to the agency that enabled the agency to run all the messages

through its HARVEST computer to look for particular keywords, locations, senders or addressees.

Project SHAMROCK became so successful that the in 1966 NSA and CIA set up a front company in lower Manhattan (where the offices of the telegraph companies were

located) under the codename LPMEDLEY.

At the height of Project SHAMROCK, 150,000 messages a month were printed and analyzed by NSA agents.<33>

NSA Director Lew Allen brought Project SHAMROCK to a crashing halt in May 1975 as congressional critics began to rip open the program’s shroud of secrecy.

The testimony of both the representatives from the cable companies and of Director Allen at the hearings prompted Senate Intelligence Committee chairman Sen.

Frank Church to conclude that Project SHAMROCK was,

“probably the largest government interception program affecting Americans ever undertaken.”<34>

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Project MINARET

A sister project to Project SHAMROCK, Project MINARET involved the creation of “watch lists” by each of the intelligence agencies and the FBI of those accused of

“subversive” domestic activities.

The watch lists included such notables as Martin Luther King, Malcolm X, Jane Fonda, Joan Baez and Dr. Benjamin Spock.

After the Supreme Court handed down its 1972 Keith decision,<35> which held that - while the President could act to protect the country from unlawful and

subversive activity designed to overthrow the government - that same power did not extend to include warrantless electronic surveillance of domestic organizations,

pressure came to bear on Project MINARET.<36>

Attorney General Elliot Petersen shut down Project MINARET as soon as its activities were revealed to the Justice Department, despite the fact that the FBI (an agency

under the Justice Department’s authority) was actively involved with the NSA and other intelligence agencies in creating the watch lists.

Operating between 1967 and 1973, over 5,925 foreigners and 1,690 organizations and US citizens were included on the Project MINARET watch lists.

Despite extensive efforts to conceal the NSA’s involvement in Project MINARET, NSA Director Lew Allen testified before the Senate Intelligence Committee in 1975 that

the NSA had issued over 3,900 reports on the watch-listed Americans.<37>

Additionally, the NSA Office of Security Services maintained reports on at least 75,000 Americans between 1952 and 1974.

This list included the names of anyone that was mentioned in a NSA message intercept.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Operation CHAOS

While the NSA was busy snooping on US citizens through Projects SHAMROCK and MINARET, the CIA got into the domestic spying act by initiating Operation CHAOS.

President Lyndon Johnson authorized the creation of the CIA’s Domestic Operations Division (DOD), whose purpose was to,

“exercise centralized responsibility for direction, support, and coordination of clandestine operations activities within the United States….”

When Johnson ordered CIA Director John McCone to use the DOD to analyze the growing college student protests of the Administration’s policy towards Vietnam, two

new units were set up to target anti-war protestors and organizations:

Project RESISTANCE, which worked with college administrators, campus security and local police to identify anti-war activists and political dissidents

Project MERRIMAC, which monitored any demonstrations being conducted in the Washington D.C. area

The CIA then began monitoring student activists and infiltrating anti-war organizations by working with local police departments to pull off burglaries, illegal entries

(black bag jobs), interrogations and electronic surveillance.<38>

After President Nixon came to office in 1969, all of these domestic surveillance activities were consolidated into Operation CHAOS.

After the revelation of two former CIA agents’ involvement in the Watergate break-in, the publication of an article about CHAOS in the New York Times<39> and the

growing concern about distancing itself from illegal domestic spying activities, the CIA shut down Operation CHAOS.

But during the life of the project, the Church Committee and the Commission on CIA Activities Within the United States (the Rockefeller Commission) revealed that the

CIA had compiled files on over 13,000 individuals, including 7,000 US citizens and 1,000 domestic organizations.<40>

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

The Foreign Intelligence Surveillance Court (FISC)

In response to the discovery of such a comprehensive effort by previous administrations and the intelligence agencies, Congress passed legislation (the Foreign

Intelligence Surveillance Act of 1978) <41> that created a top-secret court to hear applications for electronic surveillance from the FBI and NSA to provide some check

on the domestic activities of the agencies.

In 1995, Congress granted the court additional power to authorize surreptitious entries. In all of these actions, Congressional intent was to provide a check on the

domestic surveillance abuses mentioned above.

The seven-member court, comprised of federal District Court judges appointed by the Supreme Court Chief Justice, sits in secret in a sealed room on the top floor of

the Department of Justice building. Public information about the court’s hearings is scarce; each year the Attorney General is required by law to transmit to Congress a

report detailing the number of applications each year and the number granted.

With over 10,000 applications submitted to the FISC during the past twenty years, the court has only rejected one application (and that rejection was at the request of

the Reagan Administration, which had submitted the application).

While the FISC was established to be the watchdog for the Constitutional rights of the American people against domestic surveillance, it quickly became the lap dog of

the intelligence agencies.

Surveillance requests that would never receive a hearing in a state or federal court are routinely approved by the FISC. This has allowed the FBI to use the process to

conduct surveillance to obtain evidence in circumvention of the US Constitution, and the evidence is then used in subsequent criminal trials.

But the process established by Congress and the courts ensures that information regarding the cause or extent of the surveillance order is withheld from defense

attorneys because of the classified nature of the court.<42>

Despite Congress’s initial intent for the FISC, it is doubtful that domestic surveillance by means of ECHELON comes under any scrutiny by the court.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Political Uses of ECHELON and UKUSA

Several incidents of domestic spying involving ECHELON have emerged from the secrecy of the UKUSA relationship.

What these brief glimpses inside the intelligence world reveal is that, despite the best of intentions by elected representatives, presidents and prime ministers, the

temptation to use ECHELON as a tool of political advancement and repression proves too strong.

Former Canadian spy Mike Frost recounts how former British Prime Minister Margaret Thatcher made a request in February 1983 to have two ministers from her

own government monitored when she suspected them of disloyalty.

In an effort to avoid the legal difficulties involved with domestic spying on high governmental officials, the GCHQ liaison in Ottawa made a request to CSE for them to

conduct the three-week-long surveillance mission at British taxpayer expense. Frost’s CSE boss, Frank Bowman, traveled to London to do the job himself.

After the mission was over, Bowman was instructed to hand over the tapes to a GCHQ official at their headquarters.<43> Using the UKUSA alliance as legal cover is

seductively easy.

As Spyworld co-author Michel Gratton puts it,

The Thatcher episode certainly shows that GCHQ, like NSA, found ways to put itself above the law and did not hesitate to get directly involved in helping a specific

politician for her personal political benefit…

[T]he decision to proceed with the London caper was probably not put forward for approval to many people up the bureaucratic ladder. It was something CSE figured

they would get away with easily, so checking with the higher-ups would only complicate things unnecessarily.<44>

Frost also told of how he was asked in 1975 to spy on an unlikely target - Prime Minister Pierre Trudeau’s wife, Margaret Trudeau.

The Royal Canadian Mounted Police’s (RCMP) Security Service division was concerned that the Prime Minister’s wife was buying and using marijuana, so they

contacted the CSE to do the dirty work. Months of surveillance in cooperation with the Security Service turned up nothing of note.

Frost was concerned that there were political motivations behind the RCMP’s request:

“She was in no way suspected of espionage.