Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy Data Storage Hardware Science

The Hardware Behind Echelon Revealed 344

Whispering Bob writes "Techworld has got an interesting article on the technology behind the Echelon spying networks run by the US, UK, Cananda and Australia. Apparently the super storage and analysing technology used in the US is sold by privately owned Texas Memory Systems. It can deal with one trillion floating point operations per second. Now that's some technology."
This discussion has been archived. No new comments can be posted.

The Hardware Behind Echelon Revealed

Comments Filter:
  • by Amiga Lover ( 708890 ) on Sunday October 17, 2004 @08:56AM (#10549699)
    You bastards. You've slashdotted echelon.
    • by davron05 ( 778470 ) on Sunday October 17, 2004 @09:09AM (#10549759)
      direct link to the mirrordot cache [mirrordot.org]
    • by Taco Cowboy ( 5327 ) on Sunday October 17, 2004 @09:18AM (#10549781) Journal
      What ? The US spy department still relies on ASICs ?

      Don't they heard of FPGAs ?!
      • Doesnt the government have to buy from the lowest bidder?
      • by bliksem ( 822818 ) on Sunday October 17, 2004 @02:22PM (#10551083)
        Using FPGAs for an Echelon type system where maximizing GB/s is a primary goal? Unlikely.

        I work on digital system designs clocked in the 150MHz region. No problem at all meeting the timing constraints on a typical 0.13um ASIC technology. We use FPGA's for testing and validation, however, and the latest and greatest FPGA's are maxing out with our designs at around 90MHz.

        Now look at the clock speeds on the x86 you are using to browse this page. 3GHz maybe? How fast would this design run on FPGA (assuming it would fit)? Unlikely to reach even 1/10th the speed. Why not say to Intel/AMD/TI "You still use ASICs!?!"

        In terms of speed, current FPGA technology cannot get anyway near the performance of a well optimized ASIC design (even with the same core process technology).

        How about a new type of slashdot effect... we pick a few random bad words and slashdotters make sure to mention them several times in all phone conversations.
        • by Lord Prox ( 521892 ) on Sunday October 17, 2004 @06:33PM (#10552456) Homepage
          How about a new type of slashdot effect... we pick a few random bad words and slashdotters make sure to mention them several times in all phone conversations.

          Thats a capitol idea, comrad. you are da bomb. Now, if you will excuse me while I nuke a burrito and trim a bush in my back yard. See for several days this bag dad bought has been getting on my last nerve. Gas up the lincon, we are going to kill some time.
    • Question (Score:5, Funny)

      by Pan T. Hose ( 707794 ) on Sunday October 17, 2004 @10:28AM (#10549982) Homepage Journal

      You bastards. You've slashdotted echelon.

      Since it's slashdotted, I have a question: could someone please tell me what is that "echelon" thing we are talking about? It seems interesting with those trillion floating point operations and all that but I don't have much time to search for more info right now because I am very busy building a nuclear bomb for Robert Malda, pseudonym CmdrTaco, Commander in Chief of the Slashdot terrorist organisation, and if I don't give it to him before the narcotic transport arrives and he won't be able to assassinate the president on time, then my arse is going to expericence some serious jihad with his weapons of mass destruction, because how else will he be able to overthrow the federal government and start the violent uprising to destroy democracy and bring Islamic fundamentalism to the US? So, could anyone tell me what's that? Thanks.

      • Echelon, among other stuff, is supposed to snoop on telecommunication networks.

        For example, matching voice patterns, it will alert the CIA every time someone utters 'Ana raicha al quaeda' in arabic.

        This has been known to cause too many alerts at a time when an earthquake caused a colera epidemic, which caused many arabs to go to the 'sit' (quaeda) frequently.

        Echelon has been critizised in the far dull past to lack overlook and control of who enters keywords, so the public wouldn't know whether it has bee
  • by Pingular ( 670773 ) on Sunday October 17, 2004 @08:57AM (#10549700)
    Echelon [wikipedia.org]
  • by Anonymous Coward on Sunday October 17, 2004 @09:01AM (#10549722)
    Posting as annoyomous coward due to evil echelon listening post in the hills behind me. Will get my revenge.
  • Mirror (Score:4, Funny)

    by HyperChicken ( 794660 ) on Sunday October 17, 2004 @09:01AM (#10549725)
    http://64.233.167.104/search?q=cache:4mzhQXtHaVoJ: www.techworld.com/storage/news/index.cfm%3FNewsID% 3D2430+&hl=en Brought to you by Google. Google: For when the NSA supercomputer network just isn't enough.
  • by Tracer_Bullet82 ( 766262 ) on Sunday October 17, 2004 @09:02AM (#10549730)
    of cananda.
    That damn intelligence war must be really working. :)
  • by Yo Maing ( 721828 ) on Sunday October 17, 2004 @09:03AM (#10549731)
    Want to know the hardware behind Echelon? Uncle Sam using Texas' SAM.

    By Chris Mellor, Techworld

    You've probably heard about Echelon, the vast listening system run by the US, UK, Canada and Australia that scans the world's voice traffic looking for key words and phrases.

    Aside from using the system for industrial espionage and bypassing international and national laws to listen in on people, it is also used to listen out for people like Osama bin Laden and assorted terrorists in the hope of preventing attacks.

    All this is out in the relative open thanks to investigative journalists and a European Commission report into the system, concerned and annoyed that the Brits and Yanks has got there first.

    It works like this: The calls are recorded by geo-stationary spy satellites and listening stations, such as the UK's Menworth Hill, which combine satellite-intercepted calls and trunk landline intercepts and forward them on to centres, such as the US' Fort Meade, where supercomputers work on the recordings in real time.

    But what, you ask, can deal with that overwhelming mass of data that helps our government spy on the world? And how does it work?

    Well, a Texas Memory Systems SAM product - a combined solid-state disk (SSD) and DSP (digital signal processor). Woody Hutsell, an executive VP at TMS, said: "Fifty percent of our revenue this year will come from DSP systems, more than last year. The systems are a combination of SSD with DSP ASICs." ASICs are application-specific integrated circuits - chips dedicated to a specific purpose.

    TMS has a TM-44 DSP chip which has 8 GFLOPS of processing power - that's eight billion floating point operations per second. The processing uses floating point arithmatic operations to supply the accuracy needed for the analysis. A DSP chip turns analogue signals from a sensor or recorder into digital information usable by a computer. Digital cameras will use a DSP to turn the light signals coming through the lens into digital picture element, or pixel, information.

    A SAM-650 product is called a 192 GFLOPS DSP supercomputer by TMS. It is just 3U high and has 24 DSP chips and is positioned as a back-end number cruncher controlled by any standard server - a similar architecture to that used by Cray supercomputers. There are vast streams of information coming from recorded telephone conversations. The ability to have the DSPs work in parallel speeds up analysis enormously. Spinning hard drives can't feed the DSPs fast enough, nor are they quick enough for subsequent software analysis of the data. Consequently TMS uses its solid state technology to provide a buffer up to 32GB that keeps the DSPs operating at full speed.

    A cluster of five SAM-650's provides a terra flop of processing power; one trillion floating point operations per second.

    Echelon is a global surveillance network set up in Cold War days to provide the US goverment with intelligence data about Russia. One of the main contractors is Raytheon. Lockheed Martin has been involved in writing software for it. Since then it has expanded into a general listening facility, an electronic vacuum cleaner, sucking up the world's telephone conversations. Information about it's existence has been reluctantly revealed, prompted by scandals such as the recordings of Princess Diana's telephone calls by the NSA.

    Recorded signals are fed into the TMS SAM systems where the DSPs filter out the noise to produce much clearer signals that software can work on to detect individual voices, perform voice recognition, and listen out for keywords, such as, for example, "Semtex". Decryption of encrypted calls is also a likely activity.

    Hutsell says the SAM systems, "are supplied to intelligence agencies and the military though system integrators like Raytheon, Lockheed Martin and Zeta. It's an intelligence community application involving data from various sources. This is loaded into RAM and then real-time analysis is carried out on

  • Echelon... (Score:5, Interesting)

    by imsabbel ( 611519 ) on Sunday October 17, 2004 @09:07AM (#10549749)
    Hm.
    1 Tflops would place it anywhere between place 240 (if it were sustained) or 500+ (if it were peak) on the current top500.
    Not THAT amazing.
    Also, i dont quite realize how important floating point ops are in a data-warehousing application. They just pile up tons of (faxes/emails/phone recording).

    Btw: Remember the story about the 5MW wind-generator a few weeks ago?
    The company cant sell in the us because echelon was used to sniff fax messages that were later given to a us company (kenetech windpower) which made a patent. Complete with the original tying errors. (who was it again who said "whats good for boeing is good for america"?)
    (story from ZEIT, titles "treason between friends", here http://hermes.zeit.de/pdf/archiv/archiv/1999/40/19 9940.nsa_2_.xml.pdf [hermes.zeit.de]
    • When i wrote this, the link was slashdotted and no mirrors present.
      A dsp cluster... That makes the performance even less impressive...
      The grape guys in japan created that much flops per asic...
    • It gets a little more interesting if you have a football field size room full of these gadgets. Years ago, someone researched the number of incoming telephone lines to Fort Meade, it was huge.
    • Re:Echelon... (Score:2, Insightful)

      by torpor ( 458 )
      Not THAT amazing.

      I don't give a fratz about fanboix 'trainspotting' about this computing system. It means nothing that its 'not cool'.

      Just the fact that it 'only takes' a computer in the 200's region of the top500 to spy on a massive human population is impressive.

      Not fanboix whiney trainspotting. Think 'culture, eating itself'.

      Moving on .. what if this system were a -public- resource rather than a secret one? Imagine the possibilities for rock and roll!
      • A cluster of 5 units has a teraflop of processing. I couldn't see anywhere where it said how many of these they have.

        The thing that is amazing is that you have a teraflop in 15U! Just imagine a room full of the things, and that might give you more indication of the amount of processing needed to spy on everyone.

    • Re:Echelon... (Score:4, Interesting)

      by andreyw ( 798182 ) on Sunday October 17, 2004 @11:01AM (#10550106) Homepage
      Its pretty impressive considering it was designed back in the days when the SOVIETS existed.

      Makes you think what kind of advanced computers they have now that no one will find about for another 10+ years...
    • 'Complete with the original tying errors. '

      heh.

      And the story you mention is here [slashdot.org].
    • Re:Echelon... (Score:3, Insightful)

      by skinfitz ( 564041 )
      1 Tflops would place it anywhere between place 240 (if it were sustained) or 500+ (if it were peak) on the current top500. Not THAT amazing.

      That's 1 Tflop per cluster of 5 boxen - I expect they use many such clusters:

      "A SAM-650 product is called a 192 GFLOPS DSP supercomputer by TMS. It is just 3U high and has 24 DSP chips and is positioned as a back-end number cruncher controlled by any standard server - a similar architecture to that used by Cray supercomputers. There are vast streams of information
  • by Anonymous Coward
    Not all the governments involved in this had confirmed its' existance. I think Canada, Australia and New Zealand did, but not the US or UK, or something like that anyway. If it's not confirmed, and is certainly still quite secretive, how can Techworld even know about this stuff? Also, why are they allowed to print such possibly-damaging text?
  • by Anonymous Coward on Sunday October 17, 2004 @09:14AM (#10549773)
    Just use some Vi@gra and Septic T@nks in your email!
    • by Kronovohr ( 145646 ) <kronovohr.gmail@com> on Sunday October 17, 2004 @02:37PM (#10551203)

      actually, you've pretty much hit the nail right on the head.

      There's one program out there that turns a normal message into a spam message based on the textual content, and can be decoded by running it through the same program. However, this doesn't go far enough to a degree -- if you create such a message, there's only one way to distribute it effectively and subversively, as to not be detected and your agent compromised:

      spam.

      Simple steps:

      1. Make certain your recipient has tens or hundreds of low-profile email accounts on every free mail provider out there
      2. Craft your message as spam using a predetermined sequence, or use a one-time pad which the recipient has on hand that the return message will look like spam
      3. Create dummy websites that contain order information for the product(s) you're selling, and actually sell something -- the subversive can effectively use this as a side phishing tool
      4. Purchase several "100 TRILLION EMAIL ADDRESSES!@!@!@! $29.95!@!!!!!@" CDs, and scrape USENET and websites for email addresses
      5. Each time, use a different spam relay
      6. Spam every email in the list, including your recipients

      From this, the message is completely lost in noise, and is theoretically disregarded...with all the spammers out there, the noise volume is enormous.

      The only problem with this scenario is that your recipients have no measures to contact you again, but you can set up a web log or forum where you talk about kittens or someshit and they'll be able to place padded messages back, or whatever you want to do.

      Now -- hopefully, if the national governments hadn't thought about this before, we'll see a "war on spam" where they'll drop a few bunker busters on a few spammers out there :D

      • A classic example of Steganography [wikipedia.org]. The more noise, the easier to encode a useful signal. Usenet, radio signals, newspapers, and ebay are all great candidates for hidden messages. Cable television isn't such a great candidate only because it's highly regulated by either media conglomerates or governments.
  • by Anonymous Coward
    The Echelon system is basically a beowulf cluster of Symbian sex machines.
  • skynet (Score:5, Funny)

    by WormholeFiend ( 674934 ) on Sunday October 17, 2004 @09:35AM (#10549814)
    Spy in the sky satellites listen in to what we say and look at what we do. Then solid state disk keeps the real time analysis of these calls and images operating at full speed. The world's fastest storage system is used in the world's most sophisticated spying operation.

    Here's to hoping it never becomes sentient.
  • slashdotting..? (Score:5, Interesting)

    by Anonymous Coward on Sunday October 17, 2004 @09:37AM (#10549818)
    If enough people made phonecalls that were dilliberately saturated with keywords (say a few million at once)
    Would it be possible to effectively slashdot their supercomputer? >:P
    • Re:slashdotting..? (Score:3, Interesting)

      by danalien ( 545655 )
      Baahh, don't think many 'slashdotters' like to use the phone much at all.

      Instead, if everyone started encrypting their emails, or for that fact anything we'd send over the internet (to someone), with a 1024-bit or 4096-bit PGP-key(s) ... it'll be a big set back for them. Not that they aren't able to break the encryption ... is just that it'll take them a few seconds to break ONE ${ITEM} ... so if ONE billion people (we are approaching that many no. of users) sent around encrypted ${ITEMS} it'll saturate t

  • by kurt555gs ( 309278 ) <<kurt555gs> <at> <ovi.com>> on Sunday October 17, 2004 @09:38AM (#10549820) Homepage
    Now that we know how it works, lets all , I mean all call some one on our cell phone and say:

    "John has a long moustache"

    lol
  • And what about...? (Score:4, Insightful)

    by El Icaro ( 816679 ) <icaro&spymac,com> on Sunday October 17, 2004 @09:38AM (#10549824)
    What do china, north/south korea and other protective countries do about this?

    And does this listen on to the internet communications (modem beep beep blonk sounds) also?

    And finaly, what do they use this information for? Would the use it against a politician if it posed a threat for them (aka blackmailing them) or someone else?

    The world is more and more terrifying every day.
  • ... why has there not been a terrible 'accident'* in which a 747 filled with 'people'** gets flown into a military observation post by Al-Qaida***?

    * = Accident as in... Remote controlled, no pilot, full speed against military installation.
    ** = On paper, at least. There might be a small error on the flight manifest... Or 400 small errors.
    *** = Play the terrorist card; not only does it draw away suspiscion, it also garners support.

    Besides, what's this who deal about spy satelite? Don't they know it's

  • by Artifakt ( 700173 ) on Sunday October 17, 2004 @09:53AM (#10549875)
    Wondering just what Echelon is looking for?
    The word lists used by Echelon are highly classified (which of course makes sense if the goal is to keep people such as terrorists from knowing what words to avoid using). However, this also means that public oversight is impossible. Some information does get leaked to us outsiders from time to time, but always as unconfirmable rumors.
    Here's a few of those that seem likelyest to have at least a grain of truth.
    1. Echelon lists include lots of specific words that are used by people with training, and few general words widely used by the public. Words such as "Explosive" or phrases such as "Blow Up" won't get a hit, but more specific terms, i.e. "PETN", or "Semtex", may be on the list.
    2. The list is updated, both by a general review board every few months, and immediately if a particular concern warrents it. (This rummor is apperently the only thing about the system that has been officially confirmed by testimony before congress in an open session).
    3. The list is largely focused on detecting Nuclear weapons tech. It looks for correct technical names of bomb components, among other things. Lately, this has been expanded to focus more on bio-weapons.
    4. The list includes names of some public officials. Rumor has it that Attourny Generals and FBI and CIA directors have had their names placed on the list to help protect them. Janet Reno was supposedly kept on the list for a year after she left office because of concerns right-wing U.S. domestic terrorists were especially likely to target her. People running the system are reluctant to put public figures on the list, because they get too many false positives to wade through.
    5. The system looks for multiple hits and grades them algorythmicly. Several entries in the same phone call, particularly entries that are logically related, will add up to a conversation that crosses a critical threshold and is brought to the attention of a human supervisor.

    It's easy to see some ways this could be abused. For example, it could be used to help protect all the presidential candidates in an election year, but just looking for the candidate's last names would generate billions of fales positives. So, in order to 'protect' all the candidates, it would be necessary to monitor for less well known information, like the names of various campaign advisors, private addresses, or other such info, which would give the people running the system a lot of leeway in listening to calls made by the opposition during their run for the office.


    • just paste them in a couple of random emails every week....

      Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, The Artful Dodger, NAIA, SAPM, ASU, ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Ermes, Passwor
      • "White Yankee" should be "Yankee White", which is an old codeword for "for the president's eyes only"

    • economic espionage (Score:4, Insightful)

      by SuperBanana ( 662181 ) on Sunday October 17, 2004 @12:16PM (#10550464)

      You left out one major item. Economic espionage, which is why the EU investigated the program in the first place.

      A lot of european contractors kept finding themselves underbid or business stolen from them- when everything was secret and there was no explanation except eavesdropping. Further, it was only US businesses that seemed to benefit from this mysterious information-providing god.

  • by gone.fishing ( 213219 ) on Sunday October 17, 2004 @09:58AM (#10549891) Journal
    I know that this has been talked about before on Slashdot but I think the most disturbing thing about Echelon isn't the hardware (although I'd bet there is a great deal more to it than the current article talks about) but the fact that it is used to spy on whoever it happens to pickup. A certain keyword in a communication is all that it takes to get Echelon's attention and then you are in it's grasp.

    If you happen to be a U.S. citizen or resident, it is unlawful for the U.S. government to monitor your communications without a warrant. This is no problem for Echelon, the Canadians or the Brits will do it for the U.S. It is one giant loophole for the governments involved to spy on their own people as well as anyone else.

    I don't really have that much to hide but I do value my rights and my privacy so that bothers me. I know that the powers-that-be justify this as being part of the defense of the free world, that this is a necessary component on the war on terrorisiom and that such draconian measures are justified to keep us safe. But, if I have to give up my rights, my privlidges as a resident of a free country, I can't accept that explaination. Simply because the tool has become a tool of a different kind of terror. It is a took used by a represive government, used against it's own people.

    I fear a repressive regime in my own country far more than I fear Osama Bin Laden and his henchmen.

    So many of the changes made since 9/11 have played into the hands of terrorists. The changes have made the way we live, the way we travel, and the way we do business much more restrictive and expensive. Airport security is probably the most glaring example of this. We aren't anonymous travelers just getting from place to place anymore. We are electronically monitored, our travels documented. Those TSA agents and airport police aren't free - every traveler and every citizen pays for them.

    Echelon is worse than that in some ways. We don't know if or when our conversations and other communications are monitored. It is hidden from our view, shielded behind a digital curtain of secrecy. If it is used against us, we will probably never know.

    Some people probably say: "What's the big deal if it is also used to catch drug dealers anyway? They are just criminals." I can understand that position but have to say that it is a pretty narrow view. The truth is that you can't make two wrongs make a right. A regime that turns it's military against it's own people isn't very far from being the enemy. This is the kind of thing that the Gestapo did in Germany. It is just wrong.

    I'm glad to think that I live in a free country. I'm just not sure that we are as free as we think we are. I'm afraid that we already have our own version of "secret police."
    • by WildBeast ( 189336 ) on Sunday October 17, 2004 @10:42AM (#10550029) Journal
      In short, they can have each country spy on another one in order to avoid the laws of the land.

      They're even trying to legalise Extraordinary rendition [blogs.com] so they can send suspects to countries that practice torture for interrogation. It's illegal for us to kick the shit out of suspects but it's not illegal in those countries that we wanna invade.

      As long as nobody gives a damn, it'll keep getting worst.
    • by amper ( 33785 ) on Sunday October 17, 2004 @10:58AM (#10550095) Journal
      A couple of points that need emphasizing...

      I don't really have that much to hide but I do value my rights and my privacy so that bothers me.


      I think it's unfortunate that you felt it necessary to make this statement. Whether or not you (or I, or anyone else, for that matter) have anything to hide is irrelevant to this discussion. The Constitution of the United States of America codifies the primacy of individual freedom that was expressed in the Declaration of Independence and should not be abridged. The Constitution is the Law of the Land. Period. End of discussion.

      also,

      Some people probably say: "What's the big deal if it is also used to catch drug dealers anyway? They are just criminals." I can understand that position but have to say that it is a pretty narrow view.


      I do not understand that position at all. "Just criminals"? The basis of all freedom is the freedom to break the law. The true horror of Echelon is that it is yet another attempt by weak-minded, fear-filled fools who do not understand this to drag us further down the path of Tyranny in the name of Security. Echelon makes the assumption that we are all criminals.

      When we have effectively legislated all thought in a misguided attempt to prevent ThoughtCrime, we have ceased to be a free society. The idea that the interests of the State take primacy over the interests of individuals has a name...it's called Fascism.
      .
    • by Deadstick ( 535032 ) on Sunday October 17, 2004 @11:27AM (#10550229)
      Some people probably say: "What's the big deal if it is also used to catch drug dealers anyway? They are just criminals."

      Yeah, and the dialog usually goes something like this:

      "You can't do that. It violates Article--"

      "But it's drugs."

      "Oh, OK."

      rj

      • Mission creep is important. In London there are three bankers who are fighting against an extradition request [bbc.co.uk]. These guys are being handed over to USA because of a law passed in UK after 9/11. This is based on a one-way agreement with USA where UK will hand anyone USA requests but USA will never hand anyone to UK. When this was passed, it was hinted that this would be used against terrorist suspects.

        Only after a couple of years, it is used when it is found convenient.

        Probably the bankers are guilty as hell,

        • Probably the bankers are guilty as hell, as all bankers are,

          Considering noone is taking them to court in the UK, even tho the 'crime' was purpatrated in the UK, the 'victims' were in the UK, and the 'criminals' were in the UK, and in both the UK and the US there exists (or used to exist) a 'innocent until proven guilty' ethos, why are they probably guilty? And if anyone says 'well, why are they fighting their extradition if they have nothing to prove?' I would fight like hell if I was in their shoes.

    • "We don't know if or when our conversations and other communications are monitored."

      You're best to assume that they are (and invent your own clear code,) and that your cel phone is also a GPS and can give your location away to a resolution less than the flying shrapnel of a missile.

      That's why you don't hear dick from Osama any more.
    • The changes have made the way we live, the way we travel, and the way we do business much more restrictive and expensive.

      If the terrorists say "jump" and we say "how high?", the terrorists have won.
    • by nusratt ( 751548 ) on Sunday October 17, 2004 @01:43PM (#10550870) Journal
      ... right after 9/11:
      "The terrorists win only if they change us, only if they make us change who we are and how we live."

      By that standard, I'd say "Game Over".
      • by gone.fishing ( 213219 ) on Sunday October 17, 2004 @03:03PM (#10551398) Journal
        Unfortunately, I think I agree. If I were Osama Bin Laden, I'd be amazed at the return on my investment. I really very much doubt that he expected even 10% of the results that he got.

        He has won in more ways than he ever imagined. His legacy will be that he managed to make the free world less free. But when you think about it, he was only the catalyst. His timing was perfect, George W. Bush accomplished more of this than Osama did. It could even be argued that George W. Bush has made Osama his puppet to help him achieve specific political goals.

        More than once I've wondered if fifty years from now, we will learn that the government had fore-knowlege of this like they did of Pearl Harbor. I certainaly hope not but can not discount it as a possibility. Our history shows that it was done before. I'd like to think that this is impossible but I can't.

        If some day we learn that some in government knew and took no action to protect a state secret, I'll view them in the same light that I view Bin Laden and Hitler.

    • If we have stuff like :

      => Encrypted communications using GPG.
      => Encrypted VoIP using GPG

      wouldn't that make it a LOT more difficult for echelon to crack? They'll have to first crack the encryption.

      We need some kind of open-source organization that concentrates on safe-guarding privacy and that helps in the development of such tools and their widesperead adoption.

      See, the thing with OSS is that it can be used to overcome tyrannical elements - MS is one...maybe invasion of privacy is another? What do
  • by bsv368 ( 686213 ) on Sunday October 17, 2004 @10:05AM (#10549914)
    The ACLU has a fairly comprehensive, albeit slightly out of date, site [echelonwatch.org] dedicated to ECHELON.
  • by Linker3000 ( 626634 ) on Sunday October 17, 2004 @10:42AM (#10550031) Journal
    OK, we all agree a common time, dial a friend and utter the phrase:

    "George Bush, the President of the United States, would never assasinate an infidel World Leader with Semtex or a radioactive nuclear dirty bomb"

    and see what happens!

    Chew on that Echey baby!
    • Reminds me of a solution from a decade ago when the airport security thing was just getting serious. Some people were planning to go through airport security at Orlando, FL during the Chistmas season (lots of kids in the airport) wearing metal underwear. ("You want me to take it off? OK" {flash!})
  • Serious question (Score:5, Insightful)

    by Pan T. Hose ( 707794 ) on Sunday October 17, 2004 @10:43AM (#10550032) Homepage Journal
    According to Wikipædia [wikipedia.org]: "ECHELON is the largest electronic spy network in history, run by the United States, the UK, Canada, Australia, and New Zealand, capturing telephone calls, faxes and e-mails around the world. ECHELON is estimated to intercept up to 3 billion communications every day." It raises a very serious question: How on Earth do they manage to get 3 billion warrants every day?!
    • How on Earth do they manage to get 3 billion warrants every day?!

      The second largest electronic network is an automated judge/court clerk system able to process and approve up to 3 billion warrants every day.
      • How on Earth do they manage to get 3 billion warrants every day?!

        The second largest electronic network is an automated judge/court clerk system able to process and approve up to 3 billion warrants every day.

        Does it mean that I have less than 30 microseconds to appeal?

  • by seven of five ( 578993 ) on Sunday October 17, 2004 @10:46AM (#10550050)
    What I'd like to see is the list of numbers blocked from processing. White House? Kremlin? Saudi royal family? Raytheon executives and mistresses? Don't tell me everyone's equal under this scheme.
  • by IgnorantSavage ( 530289 ) on Sunday October 17, 2004 @10:46AM (#10550051)
    I'm curious about why they mention floating point performance at all since it would seem that integer performance would be far more useful for just about anything Echelon needs to do.

    Anyone know if there is a reason for the floating point reference other than just as a 'gee whiz' number?
    • Anyone know if there is a reason for the floating point reference other than just as a 'gee whiz' number?

      Echelon needs to find target words within a spoken converstaion. This implies some heavy-duty voice recognition software, given the large volume of telephone traffic to sift through and low quality of some of the most interesting data (for example, internation calls to thrid-world countries on the other side of the world). Good floating-point performance probably helps in that regard.
  • Interesting question (Score:5, Interesting)

    by Pan T. Hose ( 707794 ) on Sunday October 17, 2004 @10:53AM (#10550085) Homepage Journal
    I'm curious, what Echelon can do with Freenet? Or SSH traffic? Or IPSex? Or SSL? Or GPG email? Does it work only on clear-text communication? I suppose not because that would be utterly foolish. With VoIP it's now trivial to have encrypted voice communication all over the world. What can Echelon do about such traffic?
    • Regarding VoIP... The government is working to broadband providers to include VoIP under CALEA (Communications Assistance to Law Enforcement Act). Essentially, providers must have provisions in place to wiretap VoIP traffic.

      I would ASSume that if there's hardware available to tap VoIP, Echelon could pick it up as well ( or MADE to tie into the same hardware {if it's not already} ).
  • I'd imagine this system would only catch / bring attention to small timers and reckless teenagers who probably don't pose much threat to the government. Any group that is serious about inflicting harm would probably meet in person and work out a simple code system to make their conversations slip through the cracks of this system (ie: "Monkey" for "President", "Birthday cake" for 'bomb', etc).
  • How Is it? (Score:5, Insightful)

    by marktaw.com ( 816752 ) on Sunday October 17, 2004 @11:56AM (#10550376) Homepage
    How is it we can get exact specs for Echelon, but not for Google?
  • This begs the question though ...

    If a "terrorist" uses genreic words in their e-mail to decribe weapons or tactics then to cover all possibilities do they just monitor all e-mails and conversations of certain persons? Sure an Osama Bin Laden is on the list but what about some person they only "suspect" of terrorism.

  • by Anonymous Coward on Sunday October 17, 2004 @02:15PM (#10551044)

    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


    Violating my fourth amendment rights and eroding my civil liberties is a much greater threat to my national security than any WMD is.

    I read something everyday that makes me want to quit being an American.

  • by cohomology ( 111648 ) on Sunday October 17, 2004 @03:12PM (#10551458) Homepage

    In the late 1970's I worked for a defense contractor that built specialized signal processing computers. The NSA was a major customer. We tried to find other applications, like oil and gas exploration, but nobody else was buying.

    My job was to write microcode assemblers and then write the microcode that handled I/O. My description of the hardware is here [bway.net].

    Up to 24 voice grade channels (8K samples per second each) arrived time and/or frequency multiplexed onto a single data channel. The system detected the presence of the subchannels, determined the type of modulation being used, and ran them through the appropriate demodulator algorithm. I don't know what happened to the data after that.

    We didn't use custom chips. A cabinet full of Schottky MSI chips was enough for a three processor system. The system's speed was due to parallelism, not high clock rate.

    By the way, one of our computer rooms was built inside a big metal box that was suspended from the roof on cables. When it mattered, all external connections except for power were unplugged. We were too cheap to pay for a shielded air-conditioning system, so tests lasted a maximum of 20 minutes.

  • by Fantastic Lad ( 198284 ) on Sunday October 17, 2004 @07:46PM (#10552878)
    So. . .

    The article was published in "Techworld" which is an affiliate (one of many) of InfoWorld Media Group, which in turn is a limb of IDG. . .

    Headquartered in San Mateo, Calif., InfoWorld Media Group is a wholly owned independent business unit of IDG, the world's leading IT media, research and exposition company. IDG publishes more than 285 computer magazines and newspapers and 500 book titles and offers online users the largest network of technology-specific sites around the world through IDG.net (http://www.idg.net), which comprises more than 200 targeted Web sites in 52 countries. IDG is also a leading producer of 110 computer-related expositions worldwide, and provides IT market analysis through 49 offices in 41 countries worldwide. Company information is available at www.idg.com.

    IDG is one of those earth-flattening corporations which dominates everything. Look at their track record [idg.com]. Interestingly, they're not just interested in owning all the computer publications in the world. They also have their fingers in Brain Research [idg.com]. --Which looks on the surface to be a bit of PR angling, but 350 million worth? Whatever. Creepy.

    Huge publishing conglomerates have mandates and agendas, (whether they realize it or not), so IDG publishing articles about Echelon is interesting to say the least.

    By contrast. . .

    Slashdot is owned by OSDG. (Open Source Data Group)
    From the OSDG website [ostg.com]

    In the most recent release of Nielsen//NetRatings' @plan (Summer 2004), OSTG retained its top ranking across all competitive networks for delivering online buyers of computer hardware and software, visitors who purchase home electronics online and visitors who buy anything online. OSTG moved up in the rankings for many consumer technology categories, including visitors who are heavy spenders on computer hardware, visitors who purchase MP3 players, and visitors who purchase video games.

    For the eighth consecutive quarter, OSTG has been validated as the number one network for delivering visitors who look for technology news online. OSTG reaches over 16 million visitors every month and delivers nearly 250 million page views.

    OSDG is in turn owned by VA Software [vasoftware.com]

    [. . .]VA Software develops and markets SourceForge Enterprise Edition, an enterprise-grade solution for managing and optimizing distributed development. SourceForge Enterprise Edition provides a secure, centralized platform that connects heterogeneous tools and processes together with an integrated suite of project, change management and collaboration tools. Fortune 1000 companies and government agencies use SourceForge Enterprise Edition as a Global Development Platform(TM) to integrate disparate tools and processes, expand visibility and control, and improve development efficiency and collaboration.

    VA Software appears to have its morals lined up nicely. That is, their goal appears to be data sharing and the facilitation of collaborative creative efforts. As the much maligned, (and biblically misrepresented), Christ advised, "Judge the Tree by the Fruit it Bears." This is one of the most outstanding bits of advice I have ever heard. Flowing all the way down this particular chain, Slashdot allows peculiar guys like me to speak my mind in forum on taboo subject matter. I have an enormous amount of respect for that.

    Here's an article written by Carl Redfield [cisco.com], a guy way up at the top of th

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...