Sie sind auf Seite 1von 4

Pgina 1 de 4

UNIVERSITY OF GUAYAQUIL INDUSTRIAL ENGINEERING FACULTY TELEMATIC SCIENCES SCHOOL


Name: Jos Rosero Date: 16/04/2012 Teacher: Msc. Dlogewes Diaz ESSAY: What is ECHELON?
A highly automated global system monitoring network to process data retrieved through the interception of communication traffic around the world. In the days of the Cold War, ECHELON's primary purpose was to keep an eye / ear in the USSR In the wake of the collapse of the USSR ECHELON is officially being used to combat terrorism offenses ann, but it seems clear the main focus is on political and economic espionage. ECHELON there were rumors that in development since 1947, the result of the UKUSA treaty signed by the governments of the United States, the United Kingdom, Canada, Australia and New Zealand.

Coordination
It is coordinated by the NSA, the CIA involvement, the USAF, the Nuclear Suppliers Group, GCHQ, DSD, CSE, GCSB. It appears that the NSA is the only "contractor" who has access to all information, while other participants have only a small portion of comparingly of information.

8th Semester

Jos Rosero

Pgina 2 de 4

ECHELON system headquarters


ECHELON system headquarters is at Fort Meade in Maryland, which is the General NSA. The NSA operates many interception stations around the world, with or without the knowledge of the host country.

ECHELON functions. Each station of the ECHELON network has computers that automatically search through millions of intercepted data to contain pre-programmed keywords or fax, telex and e-mail addresses. Every word of every message is automatically searched. Computers that can search for keywords have existed at least since the 1970s, but the ECHELON system is designed to interconnect all the computers and allow the stations to function as components of an integrated whole. The scale of the collection system was described by the former director of the NSA, Vice Admiral William Studeman, in 1992 At that time the NSA system, the collection of generating about 2 million intercepted messages per hour. Of these, all but about 13,000 an hour were discarded. Of these about 2,000 met the criteria for issuing, of which about 20 are selected by analysts, who write 2 reports for subsequent distribucin.Por Therefore, in 1992 MenwithHillSation intercept 17.5 million messages a year. Of these some 17.5 million may have been considered for analysis. ECHELON obviousely justify billions of dollars of expenditure. But there are no detailed figures are available yet.

8th Semester

Jos Rosero

Pgina 3 de 4

CARNIVORE
Carnivore can read virtually all. WHAT IS CARNIVORE? Carnivore was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software such as NarusInsight. Configuration The Carnivore system was a Microsoft Windowsbased workstation with packet-sniffing software and a removable disk drive.[2] This computer must be physically installed at an Internet service provider(ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself was not highly advanced it used a standard packet sniffer and straightforward filtering. The critical components of the operation were the filtering criteria. To accurately match the appropriate subject, an elaborate content model was developed

Placement The Carnivore system could be installed on a system either through the cooperation of the system owner, or by use of a court order. Once in place, the system was restricted by U.S. Federal law[citation needed] to only monitor specific persons. Under the current regulations, publicly acknowledged government personnel are required to get a warrant or court order naming specific people or email addresses that may be monitored. When an email passes through that matches the filtering criteria mandated by the warrant, the message is logged along with information on the date, time, origin and destination. This logging was believed to be relayed in real time to the FBI. All other traffic would presumably be dropped without logging or capture
8th Semester Jos Rosero

Pgina 4 de 4

Controversy Several groups expressed concern regarding the implementation, usage, and possible abuses of Carnivore. In July 2000, the Electronic Frontier Foundation submitted a statement to the Subcommittee on the Constitution of the Committee on the Judiciary United States House of Representatives detailing the dangers of such a system. The Electronic Privacy Information Center also made several releases dealing with it. The FBI countered these concerns with statements highlighting the target-able nature of Carnivore. Assistant FBI Director Donald Kerr was quoted as saying: The Carnivore device works much like commercial "sniffers" and other network diagnostic tools used by ISPs every day, except that it provides the FBI with a unique ability to distinguish between communications which may be lawfully intercepted and those which may not. For example, if a court order provides for the lawful interception of one type of communication (e.g., e-mail), but excludes all other communications (e.g., online shopping) the Carnivore tool can be configured to intercept only those e-mails being transmitted either to or from the named subject. After prolonged negative coverage in the press, the FBI changed the name of its system from "Carnivore" to the more benign-sounding "DCS1000." DCS is reported to stand for "Digital Collection System"; the system has the same functions as before. The Associated Press reported in mid-January 2005 that the FBI essentially abandoned the use of Carnivore in 2001, in favor of commercially available software, such as NarusInsight (a mass surveillance system).

8th Semester

Jos Rosero

Das könnte Ihnen auch gefallen