Feeds

Euro Parliament calls ECHELON a paper tiger

And therefore worth duplicating

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Mainstream press reports have wildly exaggerated the potency of the US National Security Agency's (NSA's) famous ECHELON satellite spook network, the Euro Parliament's Temporary Committee on the ECHELON Interception System says in a 4 May working document which will form the basis of a final report.

The 92-page document by Rapporteur Gerhard Schmid and company carefully deflates the myth that ECHELON can intercept virtually all electronic communications around the globe.

"Analysis has revealed that the system cannot be nearly as extensive as some sections of the media have assumed," the report says.

Of course, a decent imagination tempered with common sense could have told them that much in the first place, as we've pointed out numerous times in the past.

Industrial Espionage -- Not

The Committee has also addressed persistent concerns that ECHELON's operators -- the USA, UK, Canada, Australia and New Zealand -- have been using it cooperatively to steal trade secrets and other data of economic value from European firms and governments.

This, the Committee assures us, is unlikely.

"The strategic monitoring of international telecommunications can produce useful information for industrial espionage purposes, but only by chance. In fact, sensitive industrial information is primarily to be found in the firms themselves, which means that industrial espionage is carried out primarily by attempting to obtain the information via employees or infiltrators or by breaking into internal computer networks."

"Only where sensitive data is sent outside via cable or radio (satellite) can a communications surveillance system be used for industrial espionage," the report says. And, by using relatively strong encryption, even these inevitable leaks can me minimized, it hastens to point out.

So basically, ECHELON is a paper tiger and those who fear it are being foolish, or too lazy to encrypt their most sensitive data.

You see where this is headed, we hope....

Privacy First

Another big concern for the Committee is the potential for ECHELON to violate the privacy of ordinary citizens. This, the group concludes, needs to be addressed through legislation so that all Europeans can enjoy the same, decent level of privacy protection.

And why should privacy need to be addressed aggressively, you ask? Because, "the further development of a [similar] joint European Union intelligence capacity should be considered necessary and inevitable," the Committee believes.

"The lack of such a system of political control, and therefore of political awareness and responsibility for the process of intelligence collection, would be detrimental to the process of European integration," the report concludes.

So what the Committee is saying, essentially, is that ECHELON is safe and effective; and Europe needs it too, just as soon as the legislative niceties pertaining to privacy can be tweaked enough to prevent mass opposition.

Pretty slick, eh? ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.