-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

Digital Spies Are Watching You
http://www.pcworld.com/cgi-bin/pcwtoday?ID=15775
Under Project Echelon, U.S. security agencies scan Web communications and
wireless conversations.

by Bill Wallace, special to PC World
March 16, 2000, 7:09 p.m. PT
Got an international e-mail pen pal or chat buddy? Belong to a mailing list
that includes one person from outside the United States? Use a cell phone
much? If you do, odds are good that Big Brother is watching you.

According to intelligence experts in the United States and Europe, a massive
electronic intercept program called Project Echelon scans all Internet
traffic, cell phone conversations, faxes, and long-distance telephone
calls--virtually every type of electronic communication--looking for
evidence of terrorist activity, military threats, and transnational crime.

The e-spying is being conducted by the secretive U.S. National Security
Agency and its counterparts in Australia, Canada, New Zealand, and the
United Kingdom.

"They are looking for thugs and drugs," says John Pike, expert on security
and intelligence issues for the Federation of American Scientists.

That pursuit may be worthwhile in theory, but most of what the spooks are
scanning comes from you and me, not from terrorists, criminals, or other
menaces to society.


How the Spies Work


Echelon uses a filtering process to flag messages with keywords such as
bomb, gun, and militia. But because little is known about Echelon, it
remains unclear whether the system can differentiate between messages sent
by criminals and those sent by law-abiding citizens. For example, a person
in Chicago might innocently use two or more of the keywords in an e-mail to
a friend in Japan while describing a Tom Clancy novel, or while discussing
the latest NYPD Blue episode, or even a news report about a recent terrorist
act. What happens when Echelon picks up such a message? No one knows.

If you're a typical user, your chances of coming to the attention of a live
person at the NSA--much less of being placed under more thorough
surveillance as part of an investigation--are tiny. But nevertheless, the
NSA has cast a very wide net to catch just a few suspicious goldfish. And
the agency is invading your privacy to do it.

Project Echelon's equipment can process 1 million message inputs every 30
minutes, according to a series of reports commissioned by the Scientific and
Technological Options Assessment program, a research wing of the European
Parliament.

The STOA studies finds the system filters intercepted material so minutely
that only ten inputs out of 1 million are passed along for detailed
analysis--which is likely a second level of software filtering. Even fewer
messages reach live analysts.

The system also reportedly uses voiceprint technology to search telephone
communications for targeted speakers.

Echelon uses powerful search engines--called dictionaries--to ferret out
keywords of interest to intelligence analysts. Only a handful of these
keywords from the classified dictionaries have made their way into published
reports about the program.






Who Watches the Watchers?


The possibility that innocent people may become Echelon targets or that the
project's spying may exceed legal boundaries bothers privacy activists. They
note that when an intelligence project operates in total secrecy, the public
has no way of knowing whether the program is operating within the law.

"Anytime you have a law enforcement or intelligence agency that claims it is
policing itself, I have a real problem with it," says Wayne Madsen, a
specialist on U.S. intelligence operations for the Electronic Privacy
Information Center. "I would feel a lot more comfortable if there was an
outside ombudsman who was independent who could go in and take a look," he
adds.

Echelon is so hush-hush that the NSA will not even acknowledge the program's
existence, much less discuss its targeting criteria or its civil liberties
safeguards. Only two fragmentary documents have been released under the
federal Freedom of Information Act; they consist of just seven highly
censored pages.

The STOA reports are more detailed but still leave many questions
unanswered. Partly because of STOA's reports, the American Civil Liberties
Union petitioned the House Committee on Government Reform last year and
asked for an investigation of Project Echelon. The ACLU wants to ensure that
Echelon is operating in accordance with federal law and the U.S.
Constitution.

"Echelon is a black box, and nobody outside the intelligence community knows
what is inside it," says ACLU National Director Barry Steinhardt.

For those concerned about potential abuses, the issue is simple: "What it
comes down to is, somebody is reading your mail," says Pike, who serves as
director of the Federation of American Scientists' Project on Intelligence
Reform.

"If it is an international transaction, the National Security Agency is
monitoring it," Pike adds. "The target is wide open: Essentially, it
consists of anything that would be of interest to the U.S. government--and
the rest of the English-speaking world." And no one is watching to see what
they do with the information.


Here's Looking at You, Kid


News of Echelon comes at a time when privacy concerns loom for us all.
Consumer organizations and electronic privacy groups were up in arms after
Internet advertising firm DoubleClick purchased a direct marketer last year
and announced plans to merge its consumer data into a megadatabase of names,
addresses, and Web-surfing and buying habits.

The uproar and several pending lawsuits recently led DoubleClick to put its
plan on hold. Meanwhile, the ACLU, the Cellular Telecommunications Industry
Association, the Electronic Privacy Information Center, and others are
challenging a Federal Communications Commission order. The FCC wants the
telecom industry to support extensive police surveillance capabilities in
connection with a 1994 law. A hearing is scheduled for May.

We know that our employers can monitor our e-mail. And no one condones
terrorism or crime (except terrorists and criminals). But aren't we still
entitled to some level of privacy? Echelon leaves us with few alternatives.
Pike says encrypting e-mail may offer some protection--as long as you aren't
under suspicion in the first place.

Some services can give you an e-mail name no one can trace to you, which
lends some cover. But such a solution is not practical for businesses, and
it certainly is not a viable long-term option.

For now, watch what you say, and where you send it.

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance—not soap-boxing!  These are sordid matters
and 'conspiracy theory'—with its many half-truths, misdirections and outright
frauds—is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to