5 Responses

  1. Jim Lee

    Thanks for adding my links in the Tech Toolbox. Great article, any chance you could write up something on HAARP, HIPAS, or EISCAT 3D?

  2. Jim Lee

    I would also be interested in anything related to AUSCANZUKUS, the “Five Eyes” and the technology associated with the worldwide, 5 country listening conglomerate commonly known as ECHELON.


    ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UK–USA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, known as AUSCANNZUKUS or Five Eyes).[1][2] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.

    ECHELON was reportedly created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s, but since the end of the Cold War it is believed to search also for hunts of terrorist plots, drug dealers’ plans, and political and diplomatic intelligence.

    The system has been reported in a number of public sources.[4] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.

    In its report, the European Parliament stated that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links. Source: Wikipedia


    go to http://climateviewer.com/3D/
    click Big Brother

  3. Linguacode Transmissions Have Been Intercepted | The Cyber Daily

    [...] Grove, West Virginia, there is a large eye on the east coast, where the NSA has set up shop. Two Elephant Cage antennas were installed on November 8, 1969 at the site, and a couple of very large dish antennas were [...]

  4. Zack Widup

    I worked at the Wullenweber site south of Bondville, IL once in a while in the early to mid 70′s when I was in grad school at the University of Illinois. It was a fascinating project. The Wullenweber can only be used for receiving, not for transmitting. Beam-forming computer methods allowed us to pinpoint the azimuth of the arriving radio signal within a couple degrees. The elevation angle could not be determined with a Wullenweber; that could be determined by another type of antenna called an Adcock array (also only used for receiving) a few miles away. None of what we did was confidential and the research was published in various journals, mostly the IEEE propagation journal.

Leave a Reply