Sunday, October 5, 2008

Echelon

Echelon is one of the largest and oldest (over 50 years) information sharing mechanisms in the world. It is part of a global communications tracking and surveillance systems which can be used to intercept any electronic communication across the globe.
"It is the end of our right to privacy. We are placed under suspicion from the moment we start to communicating with other people."[1]

Its not possible to talk with friends/family/police/businessmen over the phone, to send private emails or chat in the web without "somebody" listening - this mystery "something" is always there.

What if one day Echelon have power to lead airplanes (by sending some signals into the airplane system), power to influence nuclear power plant or have a power to influence traffic by changing the traffic lights or just switch them off in any place around the world.
Maybe its not dangerous until this kind of information is in the right hands ( if so, it may even help to keep the world the safer place), but what if some day some people steel this information and use it in their own favor, in negative manner.
There would we chaos in the streets, people would be afraid because of unawareness, "accidents" can happen, maybe even something bigger than 9/11 - this would have devastating influence to the economy.

Data is the power not only in the web, but as a whole. Beside it everything else becomes less valued.

Is there anything we can do to protect our privacy?

As Benjamin Poole claims, there are still some possibilities how protect ourselves from listen in[2].
Of course its not 100% protection, but just messing with the system:)
1. Talk in code - use ordinary words instead of keywords, Echelon systems has difficulties noticing hidden data.
2. Change your voice or speak different language - change speech patterns and intonations.
3. Use VoIP (Voice over Internet Protocol) phone lines - it do not protect you from monitoring, but it is significantly more secure.
4. Use anonymous proxies
5. Use redundancy & concurrent communications.
6. Use encryption.

Echelon systems influence is two sided. It's great until the information stays where it belongs - influence is positive. If it spread out to third parties, we never predict the consequences.

No comments: