Summary and analysis

of visits by military/government servers

100 Club: 1. Kelly Air Force Base (76th Communications Squadron), San Antonio, Texas, 128 (*)(**) More than two dozen radioactive waste sites have been identified at the closed Kelly Air Force Base in San Antonio. Closed, now called KellyUSA, an industrial park with both airfield and rail capabilities. KellyUSA Business Park KellyUSA is a former air force base now home to more than 60 tenants in the aviation, logistics, warehousing/distribution and manufacturing industries. A mile-long runway (11,550 feet) is available through a Joint Use Agreement between the United States Air Force and the Park. www.kellyusa.com 2. Schriever Air Force Base (Space Warfare Center/Ballistic Missile Defense Organization), Colorado, 125 (**) Schriever Air Force Base, the newest base in the United States Air Force, is located approximately 10 miles east of Peterson Air Force Base in Colorado Springs, Colo. GPS specialists in Iraq. Tenant organizations at Schriever Air Force Base include the Joint National Test Facility; Ballistic Missile Defense Organization; Space Warfare Center, 17th Test Squadron; 576th Flight Test Squadron; 55th Space Weather Squadron; Operating Location, Space and Missile Systems Center, Detachment 11; 11th Space Warning Squadron; Cheyenne Mountain Training and Simulation System; 2nd Command & Control Squadron; 18th Intelligence Squadron; Detactment 46, Air Force Technical Applications Center; Detachment 807, Air Force Office of Special Investigation; and the 310th Space Group. 3. Defense Enterprise Computing Center (DECC), Columbus, Ohio, 144 (**) 4. Defense Enterprise Computing Center (DECC), San Diego, CA, 100 (**) DISA. Five main centers, with 14 Detachments in the USA. 5. Naval Computer and Telecommunications Area Master Stations: Atlantic, Amphibious Base, Norfolk, Virginia, 175 (**) (*) refers to an installation that is a part of the Central Intelligence Agency's Open Source Information System (OSIS). (**) refers to an installation that uses the Department of Defense's Non-secure Internet Protocol Router Net (NIPRNET or nipr.mil). Soon to join: Scott Air Force Base (375th Communications Squadron), Illinois, 91 (**) Navy-Marine Corps Intranet, 89 Ames Research Center, Moffett Federal Airfield, California, 81 (**) (***) Single Agency Manager, the Pentagon, Washington DC, 80 (**) (***) NASA

1. Foreign countries (governments, military forces and police departments).

Visitors come from 29 different countries, 16 of which are in Europe; 4 in South America; 3 in Asia; 2 in the South Pacific; 2 in the Mid-East; 1 in Africa; and 1 in North America. Most of these visitors don't return or only return a few times. The timing of these visits is significant, and perhaps indicative of the purpose of the visit itself. For example, the French military has only visited once, but on the very day that it announced that it too has uninhabited aerial vehicles, about which we (the SCP) have written because of their use as surveillance devices.

Three of these 29 countries -- Australia, Canada and England -- stand out because they are home to the small number of visitors who, unlike the others, return to our website over and over and over again. These three countries also happen to be English-speaking and allies of the United States military.

There are a total of 4 frequent visitors, each of which has visited at least 40 times: the Department of Defence (Australia), the Ministry of Management Services, Information Technology Services Division (British Columbia, Canada); unknown, using a secure government server (England); and the Hants City Council (England). From the timing and spacing of these visits, it seems likely that 1) both the Canadian Ministry of Management Services and the unknown people in England (perhaps MI6, the English counterpart of the CIA) have assigned case officers to the SCP's website, which only gets visited during the work week and between 9 am and 5 pm local time; 2) the Department of Defence (Australia) has assigned to our "case" a data-mining computer, which visits at all times of day and night; and 3) the Hants City Council -- no doubt not in possession of case officers or data-mining computers -- has someone in it who is a big fan (enemy?) of our work (visits only during working hours).


2. New York (City and State).

Visitors are either law enforcement authorities or government bodies charged with maintaining "homeland security." All visits have taken place during business hours, which suggests that people, not data-mining computers, are doing the visiting. The only visitor that has returned over and over again comes from a "place" (ccea.nyc.gov) that cannot be resolved or investigated any further. This suggests that ccea.nyc.gov is either the Intelligence Division of the NYPD or a Joint Terrorism Task Force.


3. Other state governments.

Visitors are either law enforcement authorities or government bodies charged with maintaining "homeland security." Almost all visits take place during business hours, which suggests that people, not data-mining computers, are doing the visiting. The only visitor that has returned over and over again is California's Transportation Department. Eight other states have Transportation Departments that have visited our website; like "Corrections" (6 states), "Transportation" is a thread that runs through these statistics.


4. The US federal goverment.

Visitors are either law enforcement authorities or government bodies charged with maintaining "homeland security." Almost all visits take place during business hours, which suggests that people, not data-mining computers, are doing the visiting.

The following agencies (or, rather, employees of these agencies) have visited over and over again: Federal Emergency Management Agency; Federal Aviation Administration; the Department of Justice; the Department of the Treasury; the federal judiciary (federal court system); the General Services Administration; the Social Security Administration; and the Department of State. A lot in NASA: Goddard Langley Jet Propulsion National laboratories: Lawrence Livermore Oak Ridge Sandia Idaho National Engineering and Environmental Laboratory, veterans admin wash dc Alphabetical list and speculation, if any, on specific reason for visits: Central Intelligence Agency (open source intelligence); Commerce Department (commercial exploitation of surveillance data); Energy Department (national laboratories [see below], critical infrastructures); Interior Department; Homeland Security/Miscellaneous ("anti-American" and/or "anti-Bush" political dissent in the US); law enforcement (legality of SCP maps of camera locations); National Aeronautical and Space Administration (pioneers of video-enhancement, live television broadcast and satellite technologies); National Institute of Health (surveillance in the medical sense of the word); national energy laboratories (data-mining super-computers, nuclear or satellite-guided weapons); National Ocean and Atmosphere Administration (video surveillance, broadcast and satellite technologies); President of the United States (bi-annual national security briefings on "anti-American" political dissent in the US); Transportation Department (video surveillance of public highways); Veterans Administration; and the Virgin Islands.


5. US military. The overwhelming majority (93 percent) of these visitors use one of the following hosts to access our site: 1) nipr.mil, the Non-secure Internet Protocol Router (NIPR) Net (43 percent of all visits to date); 2) af.mil, the Air Force (19 percent of all visits); 3) navy.mil, the Navy (13 percent); 4) army.mil, the Army (11 percent); 5) usmc.mil, the United States Marine Corps (5 percent); and 6) disa.mil, the Defense Information Systems Agency (2 percent).

Each one of the five most-frequent visitors to the site is connected to the NIPRNET, which acts as an intermediary between the Department of Defense's internal computer systems and the Internet. The host that visits the most often -- the Computer and Telecommunications Area Master Station in Norfolk, Virginia (155 total visits to date) -- is part of the Navy. Two of the five most-frequent visitors are part of the Air Force: the 76th Communications Squadron, Kelly Air Force Base, San Antonio, Texas (112 total visits); and the Space Warfare Center/Ballistic Missile Defense Organization, Schriever Air Force Base, Colorado (105 total visits). The remaining two top-five visitors are part of DISA: the Defense Enterprise Computing Center in Columbus, Ohio (125 total visits), and the Defense Enterprise Computing Center in San Diego, California (94 total visits). None of the top five are part of the Army or the United States Marine Corps, both of which host a large number of infrequent visitors, rather than one or two very frequent visitors, and so together manage to account for 16 percent of all visitors.

It's clear that at least some of these visitors aren't "just screwing around," are in fact dead serious about their visits, which are not friendly in nature: for example, the Air Force Office of Special Investigations, Andrews Air Force Base, Maryland (6 total visits to date), Naval Criminal Investigations, Washington, DC (2 total visits), and the Defense Computer Investigations Training Program, Linthicum, Maryland (one visit). Or, if you prefer "security," take as your examples the National Security Agency's National Computer Security Center, Fort Meade, Maryland (20 total visits) and the US Army Security Agency, also based at Fort Meade (10 visits). Or, if "intelligence" is your game, take for example the 1st Intelligence Oversight Command (formerly "Land Information Warfare Activity"), Fort Belvoir, VA (5 visits); the Defense Intelligence Agency, Bolling Air Force Base, Washington DC (3 visits); the US Army Intelligence Center, Ft. Huachuca, Arizona (2 visits); the US Army's 485th Intelligence Division, Mainz, Germany (one visit); and Command, Control, Communications, Computers and Intelligence centers at several locations, including Fort Monmouth, NJ (5 visits), Pacific Command Headquarters in Hawaii (one visit) and the Washington DC Office of the Assistant Secretary of Defense (one visit). Just imagine the suspicions that would be aroused if the tables were turned, and it was the SCP-New York visiting the web sites of all these military agencies, and not the reverse!

-- Originally posted 25 May 2003. (To be updated as needed.)




Contact the New York Surveillance Camera Players

By e-mail SCP@notbored.org

By snail mail: SCP c/o NOT BORED! POB 1115, Stuyvesant Station, New York City 10009-9998




NOT BORED!