Digital Spies Are Watching You

SAN FRANCISCO (03/20/2000) - Got an international e-mail pen pal or chat buddy?

Belong to a mailing list that includes one person from outside the United States? Use a cell phone much? If you do, odds are good that Big Brother is watching you.

According to intelligence experts in the United States and Europe, a massive electronic intercept program called Project Echelon scans all Internet traffic, cell phone conversations, faxes, and long-distance telephone calls--virtually every type of electronic communication--looking for evidence of terrorist activity, military threats, and transnational crime.

The e-spying is being conducted by the secretive U.S. National Security Agency and its counterparts in Australia, Canada, New Zealand, and the United Kingdom.

"They are looking for thugs and drugs," says John Pike, expert on security and intelligence issues for the Federation of American Scientists.

That pursuit may be worthwhile in theory, but most of what the spooks are scanning comes from you and me, not from terrorists, criminals, or other menaces to society.

How the Spies Work

Echelon uses a filtering process to flag messages with keywords such as bomb, gun, and militia. But because little is known about Echelon, it remains unclear whether the system can differentiate between messages sent by criminals and those sent by law-abiding citizens. For example, a person in Chicago might innocently use two or more of the keywords in an e-mail to a friend in Japan while describing a Tom Clancy novel, or while discussing the latest NYPD Blue episode, or even a news report about a recent terrorist act. What happens when Echelon picks up such a message? No one knows.

If you're a typical user, your chances of coming to the attention of a live person at the NSA--much less of being placed under more thorough surveillance as part of an investigation--are tiny. But nevertheless, the NSA has cast a very wide net to catch just a few suspicious goldfish. And the agency is invading your privacy to do it.

Project Echelon's equipment can process 1 million message inputs every 30 minutes, according to a series of reports commissioned by the Scientific and Technological Options Assessment program, a research wing of the European Parliament.

The STOA studies finds the system filters intercepted material so minutely that only ten inputs out of 1 million are passed along for detailed analysis--which is likely a second level of software filtering. Even fewer messages reach live analysts.

The system also reportedly uses voiceprint technology to search telephone communications for targeted speakers.

Echelon uses powerful search engines--called dictionaries--to ferret out keywords of interest to intelligence analysts. Only a handful of these keywords from the classified dictionaries have made their way into published reports about the program.

Who Watches the Watchers?

The possibility that innocent people may become Echelon targets or that the project's spying may exceed legal boundaries bothers privacy activists. They note that when an intelligence project operates in total secrecy, the public has no way of knowing whether the program is operating within the law.

"Anytime you have a law enforcement or intelligence agency that claims it is policing itself, I have a real problem with it," says Wayne Madsen, a specialist on U.S. intelligence operations for the Electronic Privacy Information Center. "I would feel a lot more comfortable if there was an outside ombudsman who was independent who could go in and take a look," he adds.

Echelon is so hush-hush that the NSA will not even acknowledge the program's existence, much less discuss its targeting criteria or its civil liberties safeguards. Only two fragmentary documents have been released under the federal Freedom of Information Act; they consist of just seven highly censored pages.

The STOA reports are more detailed but still leave many questions unanswered.

Partly because of STOA's reports, the American Civil Liberties Union petitioned the House Committee on Government Reform last year and asked for an investigation of Project Echelon. The ACLU wants to ensure that Echelon is operating in accordance with federal law and the U.S. Constitution.

"Echelon is a black box, and nobody outside the intelligence community knows what is inside it," says ACLU National Director Barry Steinhardt.

For those concerned about potential abuses, the issue is simple: "What it comes down to is, somebody is reading your mail," says Pike, who serves as director of the Federation of American Scientists' Project on Intelligence Reform.

"If it is an international transaction, the National Security Agency is monitoring it," Pike adds. "The target is wide open: Essentially, it consists of anything that would be of interest to the U.S. government--and the rest of the English-speaking world." And no one is watching to see what they do with the information.

Here's Looking at You, Kid

News of Echelon comes at a time when privacy concerns loom for us all. Consumer organizations and electronic privacy groups were up in arms after Internet advertising firm DoubleClick purchased a direct marketer last year and announced plans to merge its consumer data into a megadatabase of names, addresses, and Web-surfing and buying habits.

The uproar and several pending lawsuits recently led DoubleClick to put its plan on hold. Meanwhile, the ACLU, the Cellular Telecommunications Industry Association, the Electronic Privacy Information Center, and others are challenging a Federal Communications Commission order. The FCC wants the telecom industry to support extensive police surveillance capabilities in connection with a 1994 law. A hearing is scheduled for May.

We know that our employers can monitor our e-mail. And no one condones terrorism or crime (except terrorists and criminals). But aren't we still entitled to some level of privacy? Echelon leaves us with few alternatives.

Pike says encrypting e-mail may offer some protection--as long as you aren't under suspicion in the first place.

Some services can give you an e-mail name no one can trace to you, which lends some cover. But such a solution is not practical for businesses, and it certainly is not a viable long-term option.

For now, watch what you say, and where you send it.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Black Box Network ServicesDoubleClickEchelonElectronic Privacy Information CenterEuropean ParliamentFCCFederal Communications CommissionFederation of American ScientistsNational Security AgencyNSA

Show Comments