|
_____ __ __ __ ______ /\ __ \/\ \\ \ / \/\ ___\ \ \ \_\ \ \ \\ \ /\__ \ \ \__/_ \ \ __/\ \ \\ \_\/_/\ \ \___ \ \ \ \/ \ \__ __\ \ \ \/\ \_\ \ \ \_\ \/_/\_\_/ \ \_\ \____/ \/_/ \/_/ \/_/\/___/ by funtax Project P415, or "ECHELON," as it has come to be known colloquially, was reportedly born out of the UKUSA treaty between The United States, Great Britain, New Zealand, Canada and Australia, some time after the second World War. In essence, ECHELON is designed to circumvent troublesome privacy laws which prevented individual national intelligence agencies from monitoring their own people. It allows participants to intercept email, faxes, phone conversations; basically, any electronic communications. That information is then shared with the other member agencies, working in a "you spy on me, I spy on you- thenswap" fashion. Intercepted data is pumped into a vast array of computers which subject it to various keyword, voice recognition and OCR (optical character recognition) screenings to pull out words or phrases that then cause the message to be "flagged" and sent out to the appropriate agency for analysis. These "flag words" lie in the so-called "ECHELON Dictionary." It is uncertain what words or phrases flag an ECHELON scan, but fair bets can lie with anything pertaining to active Allied enemies (Hussein, Milosovic, Bin Ladin, etc.), known terrorist groups, drug trafficking, threats against world leaders, and more. In fact, if you were reading this file from my webpage, rather than this disk, you would likely have triggered an ECHELON flag! The ECHELON surveillance process works somewhat like this:
Does this all sound a bit too Orwellian to be true? While the ECHELON project has been discussed in numerous venues for some time, many people felt that it was little more than a paranoid fabrication; a fictional "plot," invented by the same people who bandied about tales of Freemasonic world domination and alien abduction. Then, last year, facts came to light that backed up the ECHELON story like never before. In
early 1998, a study done for the European Parliament, entitled An Appraisal
of Technologies of Political Control, was released. The ATPC
was a 112 page document (available here)
that detailed the scope and method of ECHELON in a more accurate fashion
than had been previously available. Its basic précis of the
program goes like this:
The ECHELON system forms part of the UKUSA system, but unlike many of the electronic spy systems developed during the cold war, ECHELON is designed for primarily non-military targets: governments, organisations and businesses in virtually every country.The ECHELON system works by indiscriminately intercepting very large quantities of communications and then siphoning out what is valuable using artificial intelligence aids like Memex to find key words. Five nations share the results with the US as the senior partner under the UKUSA agreement of 1948, Britain, Canada, New Zealand and Australia are very much acting as subordinate information servicers.So what does this all mean? In a basic sense, it means being careful what you say on the phone. It means realizing that every minute of conversation on a cellular phone is being heard by more than you and the caller on the other end. It means that individuals who are interested in protecting their own privacy must more actively embrace cryptographic software. Open (Public) Key encryption is the only way to protect yourself. But
on a larger level, it raises numerous questions about the role and methodology
of intelligence community in Western, Liberal societies. In a world
of Timothy McVeigh's, Michigan Militias, lynchings, hate crime and other
forms of domestic terrorism, is our safety worth the price of our privacy?
Also, in a potential future situation where such threats no longer exist,
how does one go about "undoing" the presence of such surveillance?
Finally, if we decide that our privacy is more important than having a
"watchful eye" monitoring the world we live in, how do we stop something
like ECHELON?
*This article may not be new to some of you. It's from a collection of pieces I have on my webpage (although it's updated and expanded). I added it because 1) I think it's a cool article and 2) we needed more content to make this newsletter bigger. |
ARTICLE------------TITLE------------------------------------------------------------------AUTHOR
1.1.1 MD2600 news staff 1.1.2 Xanadu, part 1 Graphix 1.1.3 ATM hacking file compilation evil deceiver 1.1.4
ECHELON for dummies
funtax
|