<nettime> Le Monde: CIA + NSA = SCS

From "nettime's_roving_reporter" <nettime@bbs.thing.net>
Date Tue, 29 Feb 2000 12:13:47 -0100


[: hacktivism :]

<http://cryptome.org/cia-nsa-scs.htm>

   28 February 2000. Thanks to anonymous.
   Source:
   http://www.lemonde.fr/article/0,2320,seq-2037-43570-QUO,00.html
   
   See also: 
   
     http://www.fas.org/irp/agency/scs/scsfac.htm
     http://www.iptvreports.mcmail.com/ic2kreport.htm
     http://villagevoice.com/features/9908/vest_madsen.shtml
     http://www.pbs.org/wgbh/pages/frontline/shows/unscom/interviews/gel
     lman.html
     http://www.geocities.com/CapitolHill/Senate/8789/sunday1.htm
     
   Translation by Cryptome. More information on Special Collection
   Service invited: scs@cryptome.org
     _________________________________________________________________
   
   Le Monde, February 23, 2000
   
A Secret Alliance Between the CIA and the NSA

   Updated Tuesday February 22, 2000
   
   In the United States, the NSA and the CIA have created a common
   agency, named Special Collection Service (SCS), whose activities are
   highly secret and whose role is to give to Americans, in all
   clandestinity, information on new means to overcome the difficulties
   encountered by interception operations caused by progress in
   encryption for protection of world communications.
   
   The existence of the SCS is not officially recognized. It is known
   only that this new federal agency brings together CIA and NSA teams
   expert in decrypting of transmissions especially protected against any
   intrusion which comes from the outside.
   
   Indeed, the NSA usually carries out its remote interceptions
   relatively "passively:" it intercepts what it is asked to oversee.
   However, the encryption of communications by the same parties which
   transmit them has become increasingly effective. It requires time -
   and money - to access these communications, and it becomes difficult
   "to crack" without reliable and easy access to suspected equipment.
   
   It is thus necessary to find processes which allow authentic - but
   secret - intrusions into the targeted systems, i.e., "active"
   electronic and data-processing mechanisms, like, for example, the
   possibility of introducing viruses, of collecting key words which will
   facilitate their locations with impunity, and of infiltrating
   computers or communication networks. Only the CIA, thanks to its
   agents specialized in "covert actions" - in other words clandestine
   operations on the ground - is able to intervene. This is the reason of
   this alliance between the CIA and the NSA, through joint teams which
   work to the benefit of the SCS.
   
   J. I.
     _________________________________________________________________
   
   Le Monde, February 23, 2000
   
Une alliance secrète entre la NSA et la CIA

   Mis à jour le mardi 22 février 2000
   
   AUX ÉTATS-UNIS, la NSA et la CIA ont créé une agence commune, dénommée
   Special Collection Service (SCS), dont les activités sont très
   secrètes et qui a pour rôle de donner au renseignement américain des
   moyens nouveaux lui permettant de s'affranchir, en toute
   clandestinité, des difficultés rencontrées par les interceptions,
   liées aux progrès dans le cryptage et la protection des communications
   dans le monde.
   
   L'existence de la SCS n'est pas officiellement reconnue. On sait
   seulement que cette nouvelle agence fédérale réunit des équipes de la
   CIA et de la NSA expertes dans le décodage de transmissions
   particulièrement préservées contre toute intrusion qui viendrait de
   l'extérieur.
   
   En effet, la NSA effectue habituellement ses écoutes à distance, et de
   façon relativement « passive » : elle intercepte ce qu'on lui demande
   de surveiller. Or, le cryptage des communications (lire page 3), par
   ceux-là mêmes qui les émettent, se fait de plus en plus efficace. Il
   requiert du temps - et de l'argent - pour en venir à bout, et il
   devient difficile à « casser » sans une véritable effraction
   volontaire dans les équipements incriminés.
   
   Il faut donc trouver des procédés qui permettent des intrusions
   authentiques - mais secrètes - dans les systèmes adverses,
   c'est-à-dire des mécanismes électroniques et informatiques « actifs »,
   comme, par exemple, la possibilité d'introduire des virus, de
   collecter des mots-clés qui faciliteront les repérages en toute
   impunité, et de s'infiltrer dans les ordinateurs ou dans les réseaux
   de communication. Seule la CIA, grâce à ses agents spécialisés dans
   les « coverts actions », autrement dit les opérations clandestines sur
   le terrain, est en mesure d'intervenir. C'est la raison de cette
   alliance entre la CIA et la NSA, au travers d'équipes conjointes qui
   travaillent au profit du SCS.
   
   J. I.
   
   Le Monde daté du mercredi 23 février 2000
     _________________________________________________________________
   
   http://villagevoice.com/features/9908/vest_madsen.shtml
   
   The Village Voice, February 24-March 2, 1999
   
   Jason Vest and Wayne Madsen
   
   When probing the world of espionage, rarely does a clear picture
   emerge. But according to a handful of published sources, as well as
   assessments by independent experts and interviews with current and
   former intelligence officers, the U.S. government's prime mover in
   Iraqi electronic surveillance was most likely a super-secret
   organization run jointly by the the CIA and the NSA-- the spy agency
   charged with gathering signals intelligence (known as SIGINT)-- called
   the Special Collection Service. Further, there is evidence to suggest
   that the Baghdad operation was an example of the deployment of a
   highly classified, multinational SIGINT agreement-- one that may have
   used Australians to help the U.S. listen in-- months after the CIA
   failed to realize the U.S. objective of overthrowing Saddam Hussein
   through covert action.
   
   According to former UNSCOM chief inspector Scott Ritter, when the U.S.
   took over the group's intelligence last year, a caveat was added
   regarding staffing: only international personnel with U.S. clearances
   could participate. "This requirement," says Ritter, "really shows the
   kind of perversion of mission that went on. The U.S. was in control,
   but the way it operated from day one was, U.S. runs it, but it had to
   be a foreigner [with a clearance] operating the equipment."
   
   Under the still-classified 1948 UKUSA signals intelligence treaty,
   eavesdropping agencies of the U.S., United Kingdom, Canada, Australia,
   and New Zealand share the same clearances. According to Federation of
   American Scientists intelligence analyst John Pike, this gives the
   U.S. proxies for electronic espionage: "In the context of UKUSA, think
   of NSA as one office with five branches," he says. As UNSCOM
   demonstrates, though, sometimes the partnership gets prickly; the
   British, according to Ritter, withdrew their personnel following the
   U.S.'s refusal to explain "how the data was going to be used."
   (According to a longtime British intelligence officer, there was
   another reason: lingering bad feelings over the NSA's cracking a
   secret UN code used by British and French peacekeepers during a
   Bosnian UN mission.) At this point, says Ritter, he was instructed to
   ask the Australian government for a "collection" specialist. "We
   deployed him to Baghdad in July of 1998," recalls Ritter. "In early
   August, when I went to Baghdad, he pulled me aside and told me he had
   concerns about what was transpiring.
   
   He said there was a very high volume of data, and that he was getting
   no feedback about whether it was good, bad, or useful. He said that it
   was his experience that this was a massive intelligence collection
   operation-- one that was not in accordance with what UNSCOM was
   supposed to be doing."
     _________________________________________________________________
   
   http://www.pbs.org/wgbh/pages/frontline/shows/unscom/interviews/gellma
   n.html
   
   Frontline, PBS, April 27, 1999
   
   Barton Gelman, Washington Post reporter:
   
   Now what the CIA did not tell UNSCOM is that the people that they sent
   to install these radio relays were also covert operatives. And they
   rigged this equipment to have a second purpose. It's actually a joint
   operation of the CIA and the National Security Agency. They operate a
   service called the Special Collection Service, and it's quite skilled
   at building hidden antennae and covert listening devices. And these
   are quite large mass, these antennas, and they're spaced throughout
   the Iraqi countryside and they beam signals. They're like repeater
   stations used in commercial radio transmissions.
   
   But they built into these a hidden antenna capable of detecting
   microwave communications. This is not their open purpose. And they
   stationed some of these antennae near critical nodes of Iraqi
   microwave communications. Now what do the Iraqis use these microwaves
   for? These are very high band width, high capacity communications
   links that operate from hilltop to hilltop, in line of sight. They
   beam a very tight, narrowly focused beam from one point to the other,
   which makes them relatively harder to intercept. They can't be
   intercepted, usually, from space or from aircraft, because the angle's
   too oblique and the signal gets dissipated. If you want to get at
   their signals, you need someone nearby on the ground to do it. So they
   essentially built a Trojan horse with these radio masts that they
   built for UNSCOM that was also feeding other Iraqi traffic back to the
   CIA. So you learned a lot about Iraq's military from that. Most of it
   was not related to special weapons or to UNSCOM's mission.

#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: nettime@bbs.thing.net


[: hacktivism :]
[: for unsubscribe instructions or list info consult the list FAQ :]
[: http://hacktivism.tao.ca/ :]