Andi Freeman on Fri, 22 Oct 1999 18:02:09 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: <nettime> Jamming Echelon |
Since Echelon is more about spotting patterns and trends than disecting invidual emails everyone mailing the same piece of text around the net will easily be filtered out and have no effect. Also since a major part of what it does is about monitoring WHO says something to WHO and WHEN and then monitoring connections between individuals, jammers are easily filtered out if postimg from a know source. I have seen some software originally designed for analysing corporate organistional structures based on phone calls and emails between individuals and departments that is know used by security organisations around the world. Believe me that there is a lot of information to be gained by simply knowning who does all the talking and to whom (encrytpted or not). By stimulating the network with an info impulse (dis/information) and watching the response across the network to that impulse a lot can be told about the level of threat presented by a group, the structure of the group and how it operates. In this sense echelon has its roots in the column-inch analysis of German and Japanese newspapers used in WWII by the US (see John Naisbitt, Megatrends, 1991, Avon Books for an example of this kind of black box analysis). Also similar statistical techniques can be employed by listening rooms (like the BBC/GCHQ listening room). Also a lot of people don't realise how easy is ta have you PGP key compromised see http://www-users.informatik.rwth-aachen.de/~senderek/certify/secret-key.protecti on.html#use) for more info. I have also had it suggested to me although I can't confirm this, that encrypting a piece of KNOWN PLAINTEXT (ie a circular) with PGP makes it much easier to crack your keys using brute force. What I can't understand is that if Ecehlon has been used by the US government to undermine foreign trade deals (like Aerospatiale got done in Argentina) why someone doesn't take them to the WTO ? Surely usage of Ecehlon for industrial espionage contravines WTO regulations of which Echelon countries are signatories ? Maybe the legal routes offered to protect free trade can be used to protect individual privacy...any ideas in this direction ? # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: [email protected] and "info nettime-l" in the msg body # archive: http://www.nettime.org contact: [email protected]