ECHELON Interception System) (2001/2098(INI))

Total Page:16

File Type:pdf, Size:1020Kb

ECHELON Interception System) (2001/2098(INI)) EUROPEAN PARLIAMENT ««« « « « « 1999 « « 2004 ««« Session document FINAL A5-0264/2001 PAR1 11 July 2001 REPORT on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)) Part 1: Motion for a resolution Explanatory statement Temporary Committee on the ECHELON Interception System Rapporteur: Gerhard Schmid RR\445698EN.doc PE 305.391 EN EN PE 305.391 2/194 RR\445698EN.doc EN ‘Sed quis custodiet ipsos custodes.’ Juvenal (ca. 60 to 130 AD), Sat. 6, 347 RR\445698EN.doc 3/194 PE 305.391 EN CONTENTS Page PROCEDURAL PAGE .............................................................................................................. 9 MOTION FOR A RESOLUTION ............................................................................................ 10 EXPLANATORY STATEMENT ............................................................................................. 21 1. Introduction: .......................................................................................................21 1.1. The reasons for setting up the committee .................................................................21 1.2. The claims made in the two STOA studies on a global interception system codenamed ECHELON .............................................................................................21 1.2.1. The first STOA report of 1997 ..................................................................................21 1.2.2. The 1999 STOA reports.............................................................................................21 1.3. The mandate of the committee ..................................................................................22 1.4. Why not a committee of inquiry? ..............................................................................22 1.5. Working method and schedule ..................................................................................23 1.6. Characteristics ascribed to the ECHELON system ...................................................23 2. The operations of foreign intelligence services…………….....................25 2.1. Introduction ...............................................................................................................25 2.2. What is espionage? ....................................................................................................25 2.3. Espionage targets .......................................................................................................25 2.4. Espionage methods....................................................................................................25 2.4.1. Human intelligence....................................................................................................26 2.4.2. Processing of electromagnetic signals .......................................................................26 2.5. The operations of certain intelligence services..........................................................27 3. Technical conditions governing the interception of telecommunications............................................................................................30 3.1. The interceptibility of various communication media...............................................30 3.2. The scope for interception on the spot ......................................................................30 3.3. The scope for a worldwide interception system ........................................................31 3.3.1. Access to communication media ...............................................................................31 3.3.2. Scope for the automatic analysis of intercepted communications: the use of filters .........................................................................................................35 3.3.3. The example of the German Federal Intelligence Service.........................................35 PE 305.391 4/194 RR\445698EN.doc EN 4. Satellite communications technology ..........................................................37 4.1. The significance of telecommunications satellites ...................................................37 4.2. How a satellite link operates......................................................................................38 4.2.1. Geostationary satellites..............................................................................................38 4.2.2. The route followed by signals sent via a satellite communication link.....................38 4.2.3. The most important satellite communication systems...............................................39 4.2.4. The allocation of frequencies.....................................................................................43 4.2.5. Satellite footprints......................................................................................................43 4.2.6. The size of antennae required by an earth station......................................................44 4.3. Satellite communications for military purposes ........................................................45 4.3.1. General.......................................................................................................................45 4.3.2. Frequencies used for military purposes .....................................................................45 4.3.3. Size of the receiving stations .....................................................................................45 4.3.4. Examples of military communications satellites .......................................................45 5. Clues to the existence of at least one global interception system..... 47 5.1. Why is it necessary to work on the basis of clues? ...................................................47 5.1.1. Evidence of interception activity on the part of foreign intelligence services ..........47 5.1.2. Evidence for the existence of stations in the necessary geographical areas .............47 5.1.3. Evidence of a close intelligence association .............................................................48 5.2. How can a satellite communications interception station be recognised? ................48 5.2.1. Criterion 1: accessibility of the installation ..............................................................48 5.2.2. Criterion 2: type of antenna ......................................................................................48 5.2.3. Criterion 3: size of antenna .......................................................................................49 5.2.4. Criterion 4: evidence from official sources ..............................................................49 5.3. Publicly accessible data about known interception stations ....................................50 5.3.1. Method.......................................................................................................................50 5.3.2. Detailed analysis........................................................................................................50 5.3.3. Summary of the findings ...........................................................................................59 5.4. The UKUSA Agreement............................................................................................59 5.4.1. The historical development of the UKUSA Agreement............................................59 5.4.2. Evidence for the existence of the agreement .............................................................61 5.5. Evaluation of declassified American documents.......................................................62 5.5.1. Nature of documents..................................................................................................62 5.5.2. Content of documents................................................................................................63 5.5.3. Summary....................................................................................................................66 5.6. Information from authors and journalists specialised in this field ............................67 5.6.1. Nicky Hager's book...................................................................................................67 5.6.2. Duncan Campbell......................................................................................................68 5.6.3. Jeff Richelson............................................................................................................69 5.6.4. James Bamford ..........................................................................................................69 5.6.5. Bo Elkjaer and Kenan Seeberg..................................................................................70 5.7. Statements by former intelligence service employees...............................................71 5.7.1. Margaret Newsham (former NSA employee)............................................................71 5.7.2. Wayne Madsen (former NSA employee) ..................................................................71 5.7.3. Mike Frost (former Canadian secret service employee)............................................71 RR\445698EN.doc 5/194 PE 305.391 EN 5.7.4. Fred Stock (former Canadian secret service employee)............................................72 5.8. Information from government sources ......................................................................72 5.8.1. USA ...........................................................................................................................72
Recommended publications
  • Case Study of NETRA
    Network Protocols and Algorithms ISSN 1943-3581 2016, Vo l . 8, No. 4 Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA Rajan Gupta Dept. of Computer Science, Faculty of Mathematical Sciences, University of Delhi 1st Floor, North Campus, Delhi – 110007, India E-mail: [email protected], [email protected] Sunil Kumar Muttoo Dept. of Computer Science, Faculty of Mathematical Sciences, University of Delhi 1st Floor, North Campus, Delhi – 110007, India Received: October 20, 2016 Accepted: December 30, 2016 Published: December 31, 2016 DOI: 10.5296/npa.v8i4.10179 URL: http://dx.doi.org/10.5296/npa.v8i4.10179 Abstract Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues.
    [Show full text]
  • JMAD Media Ownership Report
    JMAD New Zealand Media Ownership Report 2014 Published: 2014 December 5 Author: Merja Myllylahti This New Zealand Ownership Report 2014 is the fourth published by AUT’s Centre for Journalism, Media and Democracy (JMAD). The report finds that the New Zealand media market has failed to produce new, innovative media outlets, and that all the efforts to establish non-profit outlets have proved unsustainable. The report confirms the general findings of previous reports that New Zealand media space has remained highly commercial. It also confirms the financialisation of media ownership in the form of banks and fund managers. The report also observes that in 2014 convergence between New Zealand mass media and the communications sector generally was in full swing. Companies, such as Spark (former Telecom NZ), started to compete head-to-head with the traditional broadcasters on the online on-demand video and television markets. The American online video subscription service Netflix is entering the NZ market in March 2015. Additionally, the report notes evidence of uncomfortable alliances between citizen media, politicians, PR companies and legacy media. As Nicky Hager’s Dirty Politics book revealed, the National Party and PR practitioners used the Whale Oil blog to drive their own agendas. Also, events related to Maori TV, TVNZ and Scoop raise questions about political interference in media affairs. It is now evident that the boundaries between mainstream media, bloggers, public relations practitioners and politicians are blurring. Key events and trends concerning New Zealand media Financialisation of mass media ownership confirmed Substantial changes in Fairfax, APN and MediaWorks ownership Competition heats up in online television and video markets Turbulence at Maori TV Blurred lines among politicians, bloggers, journalists and PR practitioners The JMAD New Zealand media ownership reports are available here: http://www.aut.ac.nz/study- at-aut/study-areas/communications/media-networks/journalism,-media-and-democracy-research- centre/journalists-and-projects 1 1.
    [Show full text]
  • Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States
    Order Code RL33726 CRS Report for Congress Received through the CRS Web Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States September 7, 2006 Clare Feikert Foreign Law Specialist Law Library of Congress Charles Doyle Senior Specialist American Law Division Congressional Research Service ˜ The Library of Congress Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States Summary This is a comparison of the laws of the United Kingdom and of the United States that govern criminal and intelligence investigations of terrorist activities. Both systems rely upon a series of statutory authorizations: in the case of the United States primarily the Foreign Intelligence Surveillance Act and the Electronic Communications Privacy Act; in the case of the United Kingdom, the Regulation of Investigatory Powers Act, the Police Act, the Intelligence Services Act. Among other differences, the U.S. procedures rely more heavily upon judicial involvement and supervision, while those of the UK employ other safeguards. The UK procedures afford greater latitude to arrest, detain and supervise suspected terrorists than those available in the United States. Contents Introduction ......................................................1 Police Stop and Search Powers .......................................3 Police Arrest Powers ...............................................5 Detention of Suspected Terrorists.....................................5 Control Orders....................................................8
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Lawful Interception of IP Traffic
    LawfulLawful InterceptionInterception ofof IPIP Traffic:Traffic: TheThe EuropeanEuropean ContextContext Jaya Baloo Draft 1 ContentsContents § Introduction to Lawful Interception § Interception of Internet services § Origins in The European Community § The European Interception Legislation in Brief § ETSI § The Dutch TIIT specifications § Interception Suppliers & Discussion of Techniques § Future Developments & Issues IntroductionIntroduction toto LawfulLawful InterceptionInterception § ETSI definition of (lawful) interception: § interception: action (based on the law), performed by an network operator/access provider/service provider (NWO/AP/SvP), of making available certain information and providing that information to a law enforcement monitoring facility. LI Law order Enforcement Network Operator, Agency (LEA) Access Provider or Service Provider Deliver requested Law Enforcement information Monitoring Facility LILIÕÕss RaisonRaison DDÕÕetreetre §§ WhyWhy intercept?intercept? § Terrorism § Pedophilia rings § Cyber stalking § Data theft ÐIndustrial espionage § Drug dealers on the internet §§ WhyWhy not?not? § Privacy § Security LegalLegal IssuesIssues inin LILI § Judge: "Am I not to hear the truth?" Objecting Counsel: "No, Your Lordship is to hear the evidence." § Some characteristics of evidence- relevance to LI § Admissible Ð can evidence be considered in courtÐ *differs per country § Authentic Ð explicitly link data to individuals § Accurate Ð reliability of surveillance process over content of intercept § Complete Ð tells a ÒcompleteÓ story of a particular circumstance § Convincing to juries Ð probative value, and subjective practical test of presentation AdmissibilityAdmissibility ofof SurveillanceSurveillance EvidenceEvidence § Virtual Locus Delecti § Hard to actually find criminals in delicto flagrante § How to handle expert evidence? Juries are not composed of network specialists. Legal not scientific decision making. § Case for treating Intercepted evidence as secondary and not primary evidence § Primary Ð is the best possible evidence Ð e.g.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Geheimdienste
    1 | 2016 Preis: GLOBAL 3,– Euro VIEWUnabhängiges Magazin der Österreichischen Gesellschaft für Außenpolitik und die Vereinten Nationen (ÖGAVN) und des Akademischen Forums für Außenpolitik (AFA) Geheimdienste http://www.globalview.at ISSN: 1992-9889 DVR: 0875538 Nr.1/2016; global view cover 1/2016.indd 1 11.04.16 09:57 Mit einem Beitrag von Rudolf Hundstorfer Bitte gehen Sie wählen! Die Bundespräsidenten Wahl naht und wir möchten an Sie appellieren, von Ihrem Wahl- recht Gebrauch zu machen. Gehen Sie zur Wahl und bestimmen Sie mit, wer die nächsten 6 Jah- re unser Staatsoberhaupt sein soll. Weder das AFA noch die ÖGAVN können aufgrund Ihrer Überparteilichkeit eine Wahlempfehlung abge- ben, aber Sie zumindest bitten, Ihrer demokra- tischen Pflicht nachzukommen und wählen zu gehen. Wir möchten Ihnen hier auch einige Bücher von den Kandidatinnen und Kandidaten bzw. ein Buch, in dem zwei Kandidaten einen Beitrag verfasst haben, präsentieren. Zudem natürlich auch die Bücher unseres amtierenden Staats- oberhaupts und seiner „First Lady“. Liebe Leserin! Lieber Leser! Dear Readers! Jeder kennt ihn, viele begehren ihn, viele fürch- gehrten James-Bond-Filmen, entsprechen ver- ten ihn: Die Rede ist von Mr. Bond, James Bond. mutlich (noch) nicht der Realität, aber dennoch Der wohl bekannteste Geheimagent der Welt ist werfen wir einen Blick auf das Land, in dem ei- zwar nur Fiktion in Ian Flemmings Geschichten, ner der Nobelkarosen unseres Vorzeigeagenten, aber der Stereotyp eines „Geheimdienstlers“ ein BMW, produziert wird, und beleuchten den ist geschaffen. Gut aussehend, charmant, stark Waffenhandel der Bundesrepublik Deutschland. und den Bösewichten immer um einen Schritt Den so wertvollen Treibstoff für diese Autos pro- voraus.
    [Show full text]
  • Unit 18 Space Communication
    UNIT 18 SPACE COMMUNICATION Structure 18.1 Introduction Objectives 18.2 Propagation of Waves in the Earth's Atmosphere 18.3 Radio Wave Communication 18.4 Satellite Communication Orbits of Satellites Frequencies Used in Satellite Communication Remote Sensing: Application of Satellites Satellites in India 18.5 Summary 18.6 Terminal Questions 18.7 Solutions and Answers I 18.1 INTRODUCTION In Unit 17 you have studied the basics of the communication systems and We have introduced the idea of communication channels and mentioned how electromagnetic waves serve to cam signals in the audio-visual region. You have learnt about two types of communication channels: one in which the signals from the transmitter are guided along a physical path (or line) to the receiver. The mode of communication using guided media is called line communication and we take it up in the next unit. The communication process in which the signal is transmitted freely in the open space (atmosphere) is called 'space communication'. In this communication we use radio frequency waves as carriers. Communication through space refers mainly to propagation of etectromagnetic waves in the earth's atmosphere and satellite communication. This is what we shall discuss in this unit. Objectives After studying this unit, you will be able to: teach better to your students the concepts of propagation of electromagnetic waves in the atmosphere, principles of satellite communication and its usefulness, communication bands, and applications of satellites and satellite communication in India; and devise strategies to help your students to learn these concepts and assess how well these have worked.
    [Show full text]
  • Commercial and Industrial Cyber Espionage in Israel
    Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber industrial espionage globally, and attempts to estimate how much !nancial damage they cause in countries around the world and in Israel. It seeks to raise awareness of the extent of the phenomena among the relevant authorities in Israel and provide recommendations on how to grapple with it. Keywords : Cyber, espionage, industrial espionage, intellectual property, cyber crime, cyber theft, technology “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…. The vast majority of companies have been breached.” 1 Shawn Henry The director of the National Security Agency, Gen. Keith Alexander, called cybercrime “the greatest transfer of wealth in history.” The price tag for intellectual property theft from U.S. companies is at least $250 billion a year .2 Shahar Argaman is the director of the National Cyber Sta!. Col. (ret.) Dr. Gabi Siboni is the head of the Military and Strategic A!airs Program and Cyber Security Program at INSS. Military and Strategic Affairs | Volume 6 | No.
    [Show full text]
  • An Interview with James Bamford
    Investigating the Puzzle Palace: An Interview with James Bamford BONNIE BRENNAN AND KATHERINE GILBERT QUESTION: Do you consider clandestine intelligence gathering a legitimate activity for a modern nation-state? BAMFORD: I think it is very legitimate; I ju.st think that it should be directed externally. It is unrealistic not to have clandestine activities, though to some extent NSA isn't even really engaged in clandestine collection. Thousands of signals are just falling down outside right now, and all they're doing is putting out a dish and collecting them. There's not really anything clandestine about it. A listening post is a large thing with big antennae that can be seen from the road. It's just technical collection gathering, and I don't think there's anything really wrong with that as long as they're concentrating on foreign countries. We assume foreign countries can do the same thing to the United States. The Soviet Union, I'm sure, has a big listening post in Cuba. I don't see anything wrong with that. QUESTION: In his book, The Codebreakers, David Kahn shows that intelligence gathering by nations is as old as civilization. In the nineteenth century, Clausewitz described "intelligence" as the "basis . of our own plans and operations" and posited that "unreliable and transient intelligence results in a flimsy structure that can easily collapse and bury us in its ruins." What, in your opinion, is the role of intelligence today? BAMFORD: The role of intelligence is to provide a government with a third eye to see what is going on in places where it can't otherwise see; it has expanded tremendously from thirty years ago when the concentration was on human intelligence.
    [Show full text]
  • British Intelligence Against Eoka in Cyprus 1945-1960
    BRITISH INTELLIGENCE AGAINST EOKA IN CYPRUS 1945-1960 A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF SOCIAL SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY NİHAL ERKAN IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE DEPARTMENT OF INTERNATIONAL RELATIONS JULY 2019 Approval of the Graduate School of Social Sciences ___________________________ Prof. Dr. Tülin Gençöz Director I certify that this thesis satisfies all the requirements as a thesis for the degree of Doctor of Philosophy. ___________________________ Prof.Dr.Oktay Tanrısever Head of Department This is to certify that we have read this thesis and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of Doctor of Philosophy. _____________________ Prof.Dr. Hüseyin Bağcı Supervisor Examining Committee Members Assoc. Prof. Dr. M. Fatih Tayfur (METU, IR) _____________________ Prof. Dr. Hüseyin Bağcı (METU,IR) _____________________ Prof. Dr. Oktay Tanrısever (METU,IR) _____________________ Prof. Dr. Gökhan Koçer (Karadeniz Teknik Uni., ULS) _____________________ Assist. Prof.Dr. Merve Seren (Ankara Yıldırım Beyazıt Uni., INRE) _____________________ I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last name : Nihal Erkan Signature : iii ABSTRACT BRITISH INTELLIGENCE AGAINST EOKA IN CYPRUS, 1945-1960 Erkan, Nihal Ph.D; Department of International Relations Supervisor: Prof.Dr. Hüseyin Bağcı July 2019, 367 pages This thesis analyses the role of British intelligence activities in the fight against EOKA in Cyprus between 1945 and 1960.
    [Show full text]