Eveline Lubbers on Mon, 29 Nov 1999 22:50:00 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

nettime-nl: Jam Echolon nog *een* keer dan


Destijds hebben we met een paar mensen helemaal
uitgezocht hoe het verhaal over Jam Echelon nou in de
wereld kwam, en er zit inderdaad een wat rechtse-conspiracy-
hoek aanvast. Dat is aan die rare combi van trefwoorden al te zien.
Daarnaast zijn Netactivisten het er niet over eens of dit
nou een zinnige aktie is (zie kommentaar onderaan) maar die
Jam-Echelon dag heeft er wel voor gezorgd dat heel veel meer
mensen nu weten wat Echelon is.
Als je het nog niet weet kun je op de site van buro Jansen & Janssen
kijken naar het nieuwe boek (ook op papier uit) 
Luisterrijk, een gids over afluisteren.
http://www.xs4all.nl/~respub/afluisteren.
Hieronder nog een keer de naspeuringen naar de herkomst van
de Jam-Echelon dag samengevat in het Engels.
gr
eveline lubbers,
jansen & janssen

Well,
it seemed that Wired wrote a very hasty article on the
Jam Echelon Day at first and needed to correct it four times.
Latest version is at
http://www.wired.com/news/news/politics/story/22102.html

Jam Echelon Day is on 21 october, this is the right day.

The idea originated at the hacktivism mailing list.

http://hacktivism.tao.ca

Linda Thompson from the American Justice Federation falsely claimed 
the iniative, but Wired wrote it anyway. The mailinglist complained
and Wired corrected. Little later they had to find out the American
Justice Federation is an extreme right thing -( that's what our friends
here found out.)

The American Justice Federation has no site, Linda Thompson email is 
bama@latrading.net. Some older info on American Justice
Federation can be found in a report by the Anti-Defamation League (1994):

http://www.terrorism.net/Pubs/adl_mi~1.htm


en dan had Ted Byfield uit NY er nog een paar verstandige dingen
over te zeggen:
(met links onderaan)

fyi, the idea of doing it *for a day* may have originated on the
hacktivism mailing list, but the idea is close to a decade old--
it's called 'spook fodder.' tim may, author of the 'cyphernomi-
con,'[1] has been putting a block of 'interesting' words in his
.sig for at least seven years (see, for example, the cypherpunks
archive[2]); lots of other people have, too--i remember seeing
X-Spook-Fodder headers in email years ago.

like most 'hacktivist' projects, it's amazingly naive. if indeed
this action will cause problems for echelon etc., the people who
run it (and other such systems) will be well prepared to circum-
vent *one day* of technical difficulties--because, of course, they 
know about the action in advance. but it *won't* cause them prob-
lems, afaik, because NSA analysis techniques aren't based on sim-
ple dictionary searches of signal streams; on the contrary, if
this action has any effect at all, it will probably be as a nicely
defined case study for analyzing vectors of transmission and met-
rics of participation and of what people *think* is 'threatening'
to the establishment. that kind of an argument is never a good
reason *not* to do something, that's not my point in saying it.

echelon is an ongoing problem, and it's only very dimly understood.
has anyone actually bothered to review the US Patent and Trade Of-
fice patents filed on behalf of the NSA to *see* what techniques
the NSA might be using? i haven't, but i'm told they're there[3]--
and that they're much more oblique and sophisticated than just
grepping for text. the recent announcement that the CIA is spon-
soring a venture capital firm[4] suggests a much weaker link in
the intelligence establishment--that their efforts to function ef-
fectively forces them to reveal some of their technqiues indirect-
ly, through patent filings and so on. 

doing kind of thing would be much more useful that misleading tens
of thousands people into thinking they're making a difference when
they're not--and letting them sit back after a hard day of 'hack-
tivism' to rest in a false sense of security.

[1] http://www.inet-one.com/cypherpunks/
[2] http://www.oberlin.edu/~brchkind/cyphernomicon/cyphernomicon.contents.html
[3] http://www.uspto.gov/
[4] http://www.wired.com/news/news/politics/story/22004.html

cheers,
t
and
said maurice, see:

http://www.cyber-rights.org/interception/stoa/interception_capabilities_2000.htm
--
* Verspreid via nettime-nl. Commercieel gebruik niet toegestaan zonder
* toestemming. <nettime-nl> is een gesloten en gemodereerde mailinglist
* over net-kritiek. Meer info: list@dds.nl met 'info nettime-nl' in de
* tekst v/d email. Archief: http://www.factory.org/nettime-nl. Contact:
* nettime-nl-owner@dds.nl. Int. editie: http://www.desk.nl/~nettime.