Alain Kessi on Mon, 6 Dec 1999 00:20:38 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Echelon and NSA


>From Antifa Info Bulletin No. 227,  December 5, 1999
http://burn.ucsd.edu/~aff/afib.html

--------------

INTELLIGENCE
ISSN 1245-2122
Editor, Olivier Schmidt
E-mail: adi@ursula.blythe.org
Web: http://www.blythe.org/Intelligence
Tel/Fax: 33 1 40 51 85 19
Post: ADI, 16 rue des Ecoles
75005 Paris, France
Publishing since 1980
- N. 107, New Series, 29 November 1999 -

-----
____________________________________________________________________

HOW ECHELON WORKS IN THE FRAMEWORK OF NSA ACTIVITY
____________________________________________________________________

Most intelligence specialists are rather surprised by the recent media
coverage and public interest in the NSA Echelon dictionary system.
Detailed information has been publicly available since 1967 when David
Kahn published "The Codebreakers - The Story of Secret Writing"
(Macmillan) with 60 pages on the NSA. The major book on the subject
remains James Bamford's, "Puzzle Palace - Inside the National Security
Agency, America's Most Secret Intelligence Organization" (1982,
Penguin). Besides these and other books, various articles have covered
aspects of NSA use of key word for "tagging" and analyzing collected
intelligence. As one specialists stated, "I covered this story more than
a decade ago in the computer and electronics trade press and as a
researcher for a feature done by Germany's [weekly] 'Stern' on NSA
activities in Germany. I did not know the code name at the time." The
code name, Echelon, became known in August 1996 when a New Zealand
anti-nuclear activist, Nicky Hager, researching the New Zealand
Government Communications Security Bureau (GCSB), came up against the
NSA and published his book, "Secret Power" (see "New Zealand - Echelon
System Sigint Network Revealed", INT, n. 42 50). The rest is recent
media and political developments.

While the dictionary aspects of Echelon have captured public attention,
they are rather secondary part of NSA's work. "Tagging" key words serves
no purpose without powerful analysis to use it. Like information
scientists, NSA has very likely been using combinatory analysis and
cooccurrence mapping. The former consists of watching the frequency of
selected key words, or specific combinations key words, in international
telecommunications traffic. Any significant change in frequency can
indicate something is happening and target the "tagged" communications
for more in-depth analysis. This is often referred to as the "top down"
approach for managing vast amounts of information. The "bottom up"
approach is to construct cooccurrence mappings of information where
"units" -- be they reports, articles, emails, or even single paragraphs
-- are "tagged" according to the key words they contain. The
cooccurrences of key words are used as a measure of similarity between
"units" which are mapped out so that more "similar" units are closer
together on the mapping.

Copyright ADI 1999, reproduction in any form forbidden without explicit
authorization from the ADI. A one year subscription (18 issues with full
index) is US $290.


#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: nettime@bbs.thing.net