Echelon: Considerations with International Communications Monitoring
Introduction
Since the invention of radio, intelligence-gathering organizations have been developing and using eavesdropping techniques to intercept and review wireless communications. Initially, these capabilities were solely used to spy on hostile nations, and particularly for military purposes. Human operators had to manually review each transmission, and cryptanalysts pored over military ciphers in an attempt to decode important messages. As wireless communication has become an integral part of commercial and individual existence, and potential threats to security are increasingly found in peacetime and on home ground, the scope of this intelligence gathering has likewise broadened. One of the most controversial eavesdropping systems in existence is a classified project known as ‘Echelon.’ Its use of computer hardware and software to filter communications from all over the world brings up many ethical issues related to the impact of computers on privacy.
Overview of Echelon
Most of the evidence for Echelon is circumstantial, though a few facts have been established. The participating organizations (notably the US Central Intelligence Agency and National Security Agency) have neither confirmed nor denied its existence. In lieu of a discussion of the ethical issues, a brief summary of the current knowledge follows.
How it Works
Echelon is the product of Cold War efforts to monitor wireless communications in the USSR. It traces its roots back to the clandestine UKUSA alliance, a communications intelligence agreement that dates back from around 1947. Member nations include the US, Great Britain, Canada, Australia, and New Zealand. It is now known that the system has been in existence for at least 20 years.[1] In the past, high frequency radio listening posts were also used to listen to radio communications. Currently, the system is composed of a series of eavesdropping satellites, ground listening stations, and supercomputers that intercept and sift through telecommunications satellite broadcasts. These broadcasts include faxes, phone calls, and web traffic- especially those dispatched over long distances.[2] The term Echelon has never actually been mentioned by officials, but is believed to represent the computer system that manages the data gathered by the network.[3] The computers are used to store and analyze text data for key words, and to review telephone conversations for unique ‘voiceprints’ or the phone numbers of persons under surveillance.[4] This makes it possible to filter an enormous amount of traffic, since human analysts review only relevant messages. The US National Security Agency (NSA) is widely considered to be both the originator and head of the project, and likely owns and operates the major computer facilities for Echelon.
In this essay, the author
Explains that intelligence-gathering organizations have been developing and using eavesdropping techniques to intercept and review wireless communications.
Explains that most of the evidence for echelon is circumstantial, though a few facts have been established. the participating organizations have neither confirmed nor denied its existence.
Explains that echelon is the product of cold war efforts to monitor wireless communications in the ussr.
Explains that echelon was intended to intercept and analyze all manner of communications from east bloc countries. the system has been continually upgraded and expanded despite the disappearance of the original threat.
Opines that for further discussion, it is important to review relevant legislation regarding a system like echelon. since the greatest uproar regarding the secret system has come from europe, this discussion will focus on american and european union laws.
Explains that the european union has stringent privacy laws, most notable of which is the data protection directive (dpd).
Opines that echelon is a powerful tool in times of open conflict, and has been used to gather intelligence during the gulf war, kosovo conflict and the war in iraq.
Explains that terrorists finance their efforts at least in part through front companies, special interest organizations, and charities. using echelon to intercept business and political communications can be useful in cutting off this crucial terrorist resource.
Argues that the main arguments against echelon all relate to personal privacy and the related concept of civil liberty.
Asks ruth gavison if echelon violates the privacy of individuals, and how badly. eavesdropping on private conversations results in the system obtaining information about people.
Explains that filtering software is far from perfect, especially when the technology is limited to a simple keyword search, as echelon is purported to be.
Opines that echelon's use in the past, and current and future purpose are not supported from this perspective.
Opines that people would be better off with or without echelon. privacy is something people attribute value to, but people value it when they have nothing to hide.
Argues that corporate fraud, terror attacks, and crime have a negative impact on utility. echelon has shown its worth in preventing fraud and at least deterring acts of terror.
Opines that echelon's benefits are outweighed by the negative impact of surveillance on undeserving individuals. advances in the software used to filter results, additional oversight, and new interception technologies could expand without crossing this line.
Explains that echelon is justified from a natural rights perspective, and can be used to safeguard the lives and property of parties under its protection (people of the ukusa nations and possibly some allies).
Opines that echelon's use is ethically justifiable if the assurances by the organizations in charge are to be believed.
Opines that echelon is likely to change as technology improves and its mission profile changes, but at the present, it is a useful tool in the war against terror.
Cites the european parliament, directive 95/46/ec, section 2, article 7, 1995, data protection commission of ireland, 19 may 2004.
Cites ruth gavison's "privacy and the limits of law" computers, ethics & social values.
Opines that echelon is capable of conducting an unprecedented amount of domestic and corporate espionage.
Explains that the nsa and other intelligence organizations have never confirmed echelon's existence. however, there are documented instances where it was employed.
Explains that the privacy act of 1974 establishes guidelines for data storage and computer matching, including use by federal agencies, and the foreign intelligence surveillance act.
Opines that the european parliament has a very different perspective on personal privacy and privacy violations than the us government.
Argues that a government's duty to protect its people from foreign attacks is based on surveillance on civilians and non-combatant entities.
Analyzes whether echelon violates the natural right to privacy, to the extent that this right is granted.
Opines that echelon is a product of the cold war and is adaptable to current security situations.
Cites sara baase, a gift of fire, and patrick s. poole's echelon: america’s secret global surveillance network.
Cites cnn newsnet, robert windrem, the european parliament, draft report: temporary committee on the echelon interception system.
Explains the us government's united states code, n/a, cornell law school legal information institute, 16 may 2004.
Cites the european parliament's directive 95/46/ec, section 6, article 13, 1995, data protection commission of ireland, 19 may 2004, cnn.com newsnet, high-tech spy satellites not targeting americans,
Cites james rachels and helen nissenbaum's computers, ethics & social values.
ECHELON is the global electronic surveillance system of the National Security Agency. Capable of intercepting virtually any electronic communiqué in the world, this system has met harsh public criticism. Fears have spread that the National Security Agency and the rest of the Intelligence Community have been using the system to keep tabs on every citizen of the world. Allegations have escalated since the terrorist attacks of September 11, 2001.
In this essay, the author
Describes echelon as an information vaccum cleaner, taking in huge amounts of raw data at a time.
Argues that echelon's critics see it as a parallel to the past abuses of the cold war era intelligence community.
Explains how the church hearings sparked a general distrust of americas intelligence network in the 1970s.
Opines that there needs to be a more comprehensive look at how technology is being applied to americans at home.
Opines that congress should reexamine the nature of surveillance laws and the role they play in modern espionage.
Cites the united states. national security agency. statement for the record of nsa director lt. general michael v. hayden, usaf.
Explains that echelon is the global electronic surveillance system of the national security agency.
Argues that echelon is the next step in espionage, a practice that every country in the world employs and has been employing for centuries.
Cites barr, robert, and becker, elizabeth. is the us spy shop listening to your call?
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
In this essay, the author
Opines that american privacy isn't directly guaranteed in any manner under the united states constitution; however, by the fourth amendment, americans are protected from illegal search and seizure.
Explains that american society puts its entire lives online, and most often doesn't realize it. order conformation emails can be systematically intercepted, analyzed and decoded to reveal the credit card number used to make the purchase.
Opines that cyber espionage is not something that has been properly acknowledged by society since the introduction of the internet.
Argues that the nsa's domestic spying program has targeted and negated terrorist attempts to take american lives. edward snowden has stated that bathtub falls and police officers kill more americans than terrorism.
Carnivore is an unnecessary system that should be replaced by one that infringes less on the privacy of Internet users, such as one that records the data of certain subscribers and sends only that information to the FBI. The methods used for intercepting communications, from simple wiretapping to the NSA’s ECHELON satellite surveillance system, have been designed as a means of intercepting information concerning criminal and terrorist plans and using that information to apprehend suspects before they cause any harm. Carnivore, the FBI’s email “wiretapping” system, is used to scan emails on a specific ISP that is believed to be hosting a suspected criminal.
In this essay, the author
Argues that carnivore is a necessary resource for the fbi because there is so much data out there that an investigation could be jeopardized if they were not authorized to see.
Explains that carnivore was meant to be used as an antiterrorism device and an aid to apprehension of suspects communicating across the internet.
Opines that carnivore is helpful in investigations, but it does not seem effective enough to warrant the loss of privacy to other internet users.
Opines that people would be happier if carnivore was put out of use and the isp only sent the fbi information about suspected users.
States bowman, lisa m., "fbi digs deeper into the web." cnet news.
Argues that carnivore should be replaced by one that infringes less on the privacy of internet users.
Explains that carnivore scans millions of packets; it's not powerful enough to be of much use considering the size of the internet, but supporters say that it would otherwise be impossible to find anything suspicious online.
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
In this essay, the author
Explains that electronic surveillance is one of the most effective tools the united states has to protect against foreign powers and groups seeking to inflict harm on the nation.
Explains electronic surveillance is pertaining to foreign intelligence. electronic surveillance can be summarized as acquisition of data from wire or radio communications using an electronic, mechanical, or other surveillance device.
Opines that electronic surveillance of foreign intelligence is a necessary and valuable part of fisa.
Explains the pros of electronic surveillance, including the ability for the ic to intercept and process communications and information from foreign powers and international terrorist organizations.
Explains that fisa provides many pros to the ic pertaining to electronic surveillance, but it also brings with it multiple disadvantages.
Prior to September 11, 2001, there were laws already in existence that allowed the government to monitor the activities of American citizens. The Foreign Intelligence Surveillance Act (FISA), passed in 1978, was initially enacted to establish procedures for physical and electronic surveillance and collection of foreign intelligence information (it.ojp.gov). This law crea...
In this essay, the author
Explains that americans watched in horror as events unfolded in new york city, washington d.c., and a farm field in pennsylvania.
Explains that the foreign intelligence surveillance act (fisa), passed in 1978, established procedures for physical and electronic surveillance and collection of foreign intelligence information.
Explains that libraries across the country were violently opposed to the passage of the provisions that allowed this type of activity.
In March of this year another series of intelligence related issues reached the headlines of several Canadian newspapers. The intelligence agency in question was Canada’s Communications Security Establishment Canada (CSEC), CSEC has been accused of monitoring and tracking metadata of cell phones and other electronics that connected through Toronto’s Pearson International Airport and Vancouver International Airport Wi-Fi internet system. Questions concerning this activity were raised because of the Edward Snowden documents released June 5th, 2013. The documents pertaining to this incident included a PowerPoint presentation that outlined the project and its objectives. The purpose of the project was, according to these documents, to “Build upon artefact of techniques to develop new needle-in-a-haystack analytic – contact chaining across air-gaps” The project attempted to track signals received over the Wi-Fi networks and follow the metadata associated with these devices in order to see whether tracking them would be possible outside of the airport at coffee shops, local hotels, Internet Cafés, etc. The end goal would be being able to find a person in a city quickly and effectively.
In this essay, the author
Explains that canada's communications security establishment canada (csec) has been accused of monitoring and tracking metadata of cell phones and other electronics connected through toronto’s pearson and vancouver international airport wi-fi internet system.
Argues that csec's mandate explicitly states that they are not to monitor any canadian activity. the other issue raised in the inquiry was the lawfulness of monitoring this type of communications data.
Opines that the prism project in the united states is a difficult subject to address because its objectives and methods fight one another.
"A History of the NSA." Washington Post. The Washington Post, n.d. Web. 8 May 2014.
In this essay, the author
Opines that the national security agency (nsa) should not be invading united states citizens' privacy, especially when doing so has not proved effective.
Analyzes how the nsa violated the 4th amendment by searching the innocent citizens of the united states and invading their privacy.
Opines that the nsa's surveillance is faulty, yet and yet again. the naf conducted an analysis of 225 individuals, recruited by al-qaida or a like-minded group, and charged in the united states with terrorism.
Explains that edward snowden's leaked documents uncovered the existence of numerous global surveillance programs, many of them run by the nsa and the five eyes.
Opines that the nsa is bound to stop some threats after all their intensive violating of the 4th amendment.
Opines that the national security agency needs to look into new and more just ways to stop threats from damaging the united states of america.
Explains that beauchamp, zach, and capnrefsmmat have written a guide to the arguments against nsa surveillance.
Explains that gioia, ted, and christopher jon sprigman, "the criminal n.s.a." the new york times, 27 june 2013.
Explains that scuiletti, justin, and shim, eileen, "11 disturbing facts about the nsa that will piss you off."
During a conversation last year with a Houston-based network administrator, I asked, “Is wire sniffing at some random public WiFi hotspot illegal?” “No, not at all. It’s just passive…and besides, anyone stupid enough to pass their sensitive information over an unsecure network gets what they deserve.” As it turns out, he was wrong, but he’s not alone in his confusion.
In this essay, the author
Explains that packet sniffing is legal as long as you filter out data after the 48th (or 96th or 128th byte).
Explains that ohm, paul, douglas sicker, and dirk grunwald. legal issues surrounding monitoring during network research.
Explains that many people are curious about the legality of packet sniffing, but that the advice they get is contradictory.
Argues that the court of law is the deciding factor in legality. the federal wiretap act and the patriot act of 2001 were written more than 50 years ago.
The collection of data has changed in many ways for the intelligence community since non-state actors, such as Al Qaeda, have announced its goal to kill as many westerners as possible. One agency, in particular, is the National Security Agency (NSA). The NSA has demonstrated its sophisticated capabilities of using technological communications to spy on U.S. citizens and individuals abroad. This approach of collecting intelligence was deemed necessary and could bypass federal statutes, along with the Constitution, as long as there was a connection for tracking terrorists. The NSA’s surveillance program was exposed for the fir...
In this essay, the author
Explains that the intelligence community has conducted surveillance operations on a domestic and international level for years. the surveillance program has prevented over fifty terrorist attacks in the u.s.
Argues that the nsa should continue on the path of prevention and provide answers as to how it will grant the public’s request of re-instating their privacy rights.
Explains that the nsa's surveillance program was exposed for the first time in december 2004. the new york times reported that president bush had the legal authority to conduct surveillance within the u.s.
Explains that the nsa and the intelligence community have been treading on thin water with the american people in regards to how the surveillance program is retrieving its information.
Explains that security is a state of being protected from harm. terrorism has been the largest threat to america since the end of the cold war and has succeeded in creating fear in the eyes of american citizens.
Opines that terrorist cells blend in with the busy streets of america's borders. government organizations, such as the nsa, continue to evolve the security protocols and technological methods for assisting in the prevention of another attack.
Explains that whistleblowers like edward snowden, william binney, and others have raised concerns about the legality of the program and the possible termination of it.
Opines that the american public favors national security when it feels an imminent threat, but tilts the other direction when the threat seems remote.
Opines that peter feaver is accurate in suggesting that the nsa's surveillance program should remain in action.
Opines that americans want answers, more oversight, and change within the nsa’s method for collecting information. news media, congress members and some journalist have stated that the program has not thwarted any attacks.
Explains that it has not been determined what the exact role of the nsa was during the 54 cases claimed to be disrupted by the surveillance program that rep. rogers had reported on july 24, 2013.
Explains that the nsa revolves around two missions, signal intelligence (sigint) and information assurance.
Opines that american intelligence, especially american sigint, is the frontline of defense in dramatically changed circumstances. the speed of operations, ruthlessness of the enemy, and the pace of modern communications have called on us to do things in ways never before required.
Explains that americans oppose the nsa surveillance program because it violates their privacy. signit collects a u.s. person's information and if it is not relevant, the data is then suppressed.
Opines that if the real reason for terminating this program is because of a violation of privacy, the american government will keep the people's freedom, free.
Proposes a hypothetical solution that would benefit the nsa and the people's rights by making the domestic surveillance program legal and constitutional.
Proposes that the nsa reveals declassified information, facts and statistics that may persuade the opposing parties to rule out the termination of the program.
Proposes that the nsa continues to conduct its domestic surveillance operations and with the data collected on non-threatening personnel, it is deleted and categorized as a "do not monitor file."
Opines that the overall problem with the surveillance program is that there are now a high percentage of opposing citizens that do not fully grasp the potential danger this country and its allies would be in if the nsa did not have this type of program.
Opines that exposing more than whistleblowers would have a negative effect in that it would empower terrorists by inspiring them to use other means of communication.
Opines that surveillance is a successful tool in many operations. terrorism is an international issue and has individuals who contribute by means of financial, logistics and operational support.
Analyzes the nsa and domestic surveillance. the congressional record. house of representatives. 113th congress.
Cites the article, "lack of evidence," on attacks thwarted by the nsa.
Analyzes how the nsa domestic surveillance program is a surprisingly stronger case for thelegality.
Opines that most americans now oppose the nsa program.
Explains that the digital revolution has created new media technologies that make it easier to access previously printed material, now assessed electronically. with the increasing use of electronic publications, there is an increased need for electronic publication specialists.
Explains that electronic publishing specialists work with a diverse group of professionals, including printing specialists, analysts, graphic designers, web developers, multimedia specialists and photographers.
Explains that an electronic publishing specialist must have at least an associate degree or bachelor degree in graphic arts, desktop publishing, web design, or information management, with applicable substitutions for education.
Describes cental intelligence agency's electronic publishing specialist, cia.gov, 27 april 2007. web. 27 february 2014.
Compares the salaries of electronic publishing specialists to those of desktop publishers. the median wage is $39,060, and the top 10 percent earn more than $60,470.
Cites the bureau of labor statistics. "desktop publishers". bls.gov/ooh.