[WSIS CS-Plenary] Merry Xmas brought to you by the NSA

Jean-Louis FULLSACK jlfullsack at wanadoo.fr
Mon Dec 26 15:03:34 GMT 2005




Thanks Francis 
for both your information on some WSIS missings (CS is obviously co-responsible) and for your xmas wishes. I hope you did enjoy this Xmas eve in a warm atmosphere.
Coming back to the subject, there is another big missing in WSIS : Echelon ! 
Isn't this big ICT machnery a global US spy ? Under the pretence of fighting terrorism this actual Big Brother infrastructure intercepts i.a. enterprise and corporate communication (like Alcatel's, Thomson's and Siemens')* for the benefit of US gouvernrnent and ICT industry interests. However, during the whole four years WSIS process I didn't even hear any CS constituency (Plenary, C&T, WGs, Caucuses) mentioning Echelon as a threat for liberty and privacy and therefore being a real WSIS issue ! Even our "infocom" experts completely "forgot" this scandalous misuse of ICTs by the USA and the UKUSA signatory nations. This misuse didn't prevent them of signing the Declaration of principles and other official WSIS documents after having seriously downscaled the few outcomes of this long and dispendious process. 
This vast piracy network was set on the agenda of the European Parliament in 2002 and there were very revealing debates at Strasbourg based on an extensive Report in two parties by Gerhard Schmid (ESP) quoted A5-0264/2001.  Another interesting survey, that went even farther than the EP report, was carried out by the Belgian parliament in february 2002. The relevant report was issued by the Belgian Senate Members Anne-Marie Lizin and Christian van Parys. So there is lot of stuff and ground for CS to discuss, conclude and propose. 
BTW, ITU never even mentioned Echelon in its agendas despite this UN agency is responsible for a "fair" telecommunication networking. 
Will Echelon be among our CS agenda during the WSIS follow-up process ? I'll make a proposal in that direction as soon as necessary.  
All the best
Jean-Louis Fullsack, CSDPTT
* see Duncan Campbell in "IC 2000". In french : Duncan Campbell - Surveillance électronique planétaire, Editions Allia Paris, 2001

> Message du 24/12/05 20:41
> De : "Dr. Francis MUGUET" 
> A : "WSIS Plenary" 
> Copie à : 
> Objet : [WSIS CS-Plenary] Merry Xmas brought to you by the NSA
> 
> [Please note that by using 'REPLY', your response goes to the entire list. Kindly use individual addresses for responses intended for specific people]
> 
> Click http://wsis.funredes.org/plenary/ to access automatic translation of this message!
> _______________________________________
> 
> 
> Merry Xmas brought to you by the NSA
> 
> No wonder they do not like the idea of
> local internet exchange gateways...
> Has the WGIG missed something... ?
> (one more item,
> among the many things they did miss )
> 
> Have fun !
> 
> Francis
> 
> http://www.nytimes.com/2005/12/24/politics/24spy.html
> -------------------------------------------------------
> December 24, 2005
> 
> 
> Spy Agency Mined Vast Data Trove, Officials Report
> 
> By ERIC LICHTBLAU 
> 
> and JAMES RISEN
> 
> WASHINGTON, Dec. 23 - The National Security Agency has traced and 
> analyzed large volumes of telephone and Internet communications flowing 
> into and out of the United States as part of the eavesdropping program 
> that President Bush approved after the Sept. 11, 2001, attacks to hunt 
> for evidence of terrorist activity, according to current and former 
> government officials.
> 
> The volume of information harvested from telecommunication data and 
> voice networks, without court-approved warrants, is much larger than the 
> White House has acknowledged, the officials said. It was collected by 
> tapping directly into some of the American telecommunication system's 
> main arteries, they said.
> 
> As part of the program approved by President Bush for domestic 
> surveillance without warrants, the N.S.A. has gained the cooperation of 
> American telecommunications companies to obtain backdoor access to 
> streams of domestic and international communications, the officials said.
> 
> The government's collection and analysis of phone and Internet traffic 
> have raised questions among some law enforcement and judicial officials 
> familiar with the program. One issue of concern to the Foreign 
> Intelligence Surveillance Court, which has reviewed some separate 
> warrant applications growing out of the N.S.A.'s surveillance program, 
> is whether the court has legal authority over calls outside the United 
> States that happen to pass through American-based telephonic "switches," 
> according to officials familiar with the matter.
> 
> "There was a lot of discussion about the switches" in conversations with 
> the court, a Justice Department official said, referring to the gateways 
> through which much of the communications traffic flows. "You're talking 
> about access to such a vast amount of communications, and the question 
> was, How do you minimize something that's on a switch that's carrying 
> such large volumes of traffic? The court was very, very concerned about 
> that."
> 
> Since the disclosure last week of the N.S.A.'s domestic surveillance 
> program, President Bush and his senior aides have stressed that his 
> executive order allowing eavesdropping without warrants was limited to 
> the monitoring of international phone and e-mail communications 
> involving people with known links to Al Qaeda.
> 
> What has not been publicly acknowledged is that N.S.A. technicians, 
> besides actually eavesdropping on specific conversations, have combed 
> through large volumes of phone and Internet traffic in search of 
> patterns that might point to terrorism suspects. Some officials describe 
> the program as a large data-mining operation.
> 
> The current and former government officials who discussed the program 
> were granted anonymity because it remains classified.
> 
> Bush administration officials declined to comment on Friday on the 
> technical aspects of the operation and the N.S.A.'s use of broad 
> searches to look for clues on terrorists. Because the program is highly 
> classified, many details of how the N.S.A. is conducting it remain 
> unknown, and members of Congress who have pressed for a full 
> Congressional inquiry say they are eager to learn more about the 
> program's operational details, as well as its legality.
> 
> Officials in the government and the telecommunications industry who have 
> knowledge of parts of the program say the N.S.A. has sought to analyze 
> communications patterns to glean clues from details like who is calling 
> whom, how long a phone call lasts and what time of day it is made, and 
> the origins and destinations of phone calls and e-mail messages. Calls 
> to and from Afghanistan, for instance, are known to have been of 
> particular interest to the N.S.A. since the Sept. 11 attacks, the 
> officials said.
> 
> This so-called "pattern analysis" on calls within the United States 
> would, in many circumstances, require a court warrant if the government 
> wanted to trace who calls whom.
> 
> The use of similar data-mining operations by the Bush administration in 
> other contexts has raised strong objections, most notably in connection 
> with the Total Information Awareness system, developed by the Pentagon 
> for tracking terror suspects, and the Department of Homeland Security's 
> Capps program for screening airline passengers. Both programs were 
> ultimately scrapped after public outcries over possible threats to 
> privacy and civil liberties.
> 
> But the Bush administration regards the N.S.A.'s ability to trace and 
> analyze large volumes of data as critical to its expanded mission to 
> detect terrorist plots before they can be carried out, officials 
> familiar with the program say. Administration officials maintain that 
> the system set up by Congress in 1978 under the Foreign Intelligence 
> Surveillance Act does not give them the speed and flexibility to respond 
> fully to terrorist threats at home.
> 
> A former technology manager at a major telecommunications company said 
> that since the Sept. 11 attacks, the leading companies in the industry 
> have been storing information on calling patterns and giving it to the 
> federal government to aid in tracking possible terrorists.
> 
> "All that data is mined with the cooperation of the government and 
> shared with them, and since 9/11, there's been much more active 
> involvement in that area," said the former manager, a telecommunications 
> expert who did not want his name or that of his former company used 
> because of concern about revealing trade secrets.
> 
> Such information often proves just as valuable to the government as 
> eavesdropping on the calls themselves, the former manager said.
> 
> "If they get content, that's useful to them too, but the real plum is 
> going to be the transaction data and the traffic analysis," he said. 
> "Massive amounts of traffic analysis information - who is calling whom, 
> who is in Osama Bin Laden's 
> 
> circle of family and friends - is used to identify lines of 
> communication that are then given closer scrutiny."
> 
> Several officials said that after President Bush's order authorizing the 
> N.S.A. program, senior government officials arranged with officials of 
> some of the nation's largest telecommunications companies to gain access 
> to switches that act as gateways at the borders between the United 
> States' communications networks and international networks. The 
> identities of the corporations involved could not be determined.
> 
> The switches are some of the main arteries for moving voice and some 
> Internet traffic into and out of the United States, and, with the 
> globalization of the telecommunications industry in recent years, many 
> international-to-international calls are also routed through such 
> American switches.
> 
> One outside expert on communications privacy who previously worked at 
> the N.S.A. said that to exploit its technological capabilities, the 
> American government had in the last few years been quietly encouraging 
> the telecommunications industry to increase the amount of international 
> traffic that is routed through American-based switches.
> 
> The growth of that transit traffic had become a major issue for the 
> intelligence community, officials say, because it had not been fully 
> addressed by 1970's-era laws and regulations governing the N.S.A. Now 
> that foreign calls were being routed through switches on American soil, 
> some judges and law enforcement officials regarded eavesdropping on 
> those calls as a possible violation of those decades-old restrictions, 
> including the Foreign Intelligence Surveillance Act, which requires 
> court-approved warrants for domestic surveillance.
> 
> Historically, the American intelligence community has had close 
> relationships with many communications and computer firms and related 
> technical industries. But the N.S.A.'s backdoor access to major 
> telecommunications switches on American soil with the cooperation of 
> major corporations represents a significant expansion of the agency's 
> operational capability, according to current and former government 
> officials.
> 
> Phil Karn, a computer engineer and technology expert at a major West 
> Coast telecommunications company, said access to such switches would be 
> significant. "If the government is gaining access to the switches like 
> this, what you're really talking about is the capability of an enormous 
> vacuum operation to sweep up data," he said.
> 
> -- 
> 
> ------------------------------------------------------ 
> Francis F. MUGUET Ph.D 
> 
> MDPI Foundation Open Access Journals
> Associate Publisher
> http://www.mdpi.org http://www.mdpi.net
> muguet at mdpi.org muguet at mdpi.net
> 
> ENSTA Paris, France
> KNIS lab. Director 
> "Knowledge Networks & Information Society" (KNIS)
> muguet at ensta.fr http://www.ensta.fr/~muguet
> 
> World Summit On the Information Society (WSIS)
> Civil Society Working Groups
> Scientific Information : http://www.wsis-si.org chair
> Patents & Copyrights : http://www.wsis-pct.org co-chair
> Financing Mechanismns : http://www.wsis-finance.org web
> 
> UNMSP project : http://www.unmsp.org
> WTIS initiative: http://www.wtis.org
> ------------------------------------------------------ 
> 
> _______________________________________________
> Plenary mailing list
> Plenary at wsis-cs.org
> http://mailman.greennet.org.uk/mailman/listinfo/plenary
> 
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman-new.greennet.org.uk/pipermail/plenary/attachments/20051226/fcb2cbf2/attachment.htm


More information about the Plenary mailing list