ECHELON y la vigilancia masiva: entre la seguridad y la protección de la privacidad

Antonio Pinel Mañas

Resumen


En 1980 se daba a conocer el nombre de una red de vigilancia masiva e indiscriminada, centrada en las comunicaciones del ámbito civil, y operada principalmente por la Agencia Nacional de Seguridad de los EE.UU: ECHELON.
En los años siguientes, en parte gracias a una investigación oficial realizada por el Parlamento Europeo, se corroboró su existencia, se detalló su funcionamiento y extensión y se cuestionó su legitimidad.
En 2001, tras los atentados de las Torres Gemelas y la aprobación de la ley USA PATRIOT, esta red alcanzó una magnitud que tan sólo se ha comenzado a vislumbrar al divulgarse algunos de los documentos de Snowden.
Ante la probable existencia de otros sistemas similares operados por otros países, posiblemente con intereses globales más lesivos, es imperativo reflexionar sobre su necesidad, su eficacia y su encaje con la defensa de los derechos básicos de privacidad

.


Texto completo:

PDF

Referencias


Appelbaum, J.; Stark, H. ; Rosenbach, M.; Schindler, J. (2013). Berlin Complains: Did US Tap Chancellor Merkel's Mobile Phone? Spiegel Online. (www.spiegel.de/international/world/merkel-calls-obama-over-suspicions-us-tapped-her-mobile-phone-a-929642.html)

Beckwith, R. (2015). Read the CIA Director’s Thoughts on the Paris Attacks. Time. (http://time.com/4114870/paris-attacks-cia-john-brennan/)

Biddle, S. (2016). Long-secret Stingray manuals detail how police can spy on phones. The Intercept.

(https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/)

Bigo, D.; Carrera, S.; Hernanz, N.; Jeandesboz, J.; Parkin, J.; Ragazzi, F.; Scherrer, A. (2013). Mass Surveillance of Personal Data by EU Member States and its Compatibility with EU Law. (CEPS Papers in Liberty and Security in Europe; No. 62). Brussels: CEPS, 29-30.

(www.ceps.eu/publications/mass-surveillance-personal-data-eu-member-states-and-its-compatibility-eu-law)

Bogolikos, N. (1999). The perception of economic risks arising from the potential vulnerability of electronic commercial media to interception. PE 168.184 Vol 5/5/EN. Luxemburgo: European Parliament Directorate General for Research. Directorate A. The STOA Programme.

(www.europarl.europa.eu/RegData/etudes/etudes/join/1999/168184/DG-4-JOIN_ET(1999)168184_EN.pdf)

Campbell, D., Melvern, L. (1980). America's Big Ear on Europe. New Statesman. 10-14. (www.duncancampbell.org/PDF/America's%20Big%20Ear%20on%20Europe%2018%20July%201980.pdf)

Campbell, D. (1999). The state of the art in communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to COMINT targetting and selection, including speech recognition. PE 168.184 Vol 2/5/EN. Luxemburgo: European Parliament Directorate General for Research. Directorate A. The STOA Programme. (www.europarl.europa.eu/RegData/etudes/etudes/join/1999/168184/DG-4-JOIN_ET(1999)168184_EN.pdf)

CRNA Centre for Resilient Networks and Applications Simula Research Laboratory. (2015). An investigation into the claims of IMSI catchers use in Oslo in late 2014. Norwegian Police Security Service. (www.pst.no/media/76725/IMSI-report-SimulaResearch-Laboratory.pdf)

Consejo de Europa y Tribunal Europeo de los Derechos Humanos. (1950). Convenio Europeo de Derechos Humanos. (www.echr.coe.int/documents/convention_spa.pdf)

Decisión 2009/820/PESC, del Consejo de la Unión Europea de 23 de octubre de 2009. Diario Oficial de la Unión Europea, L 290/40, 07 de noviembre de 2009. (2009). (http://eur-lex.europa.eu/legal-content/ES/TXT/?uri=URISERV:jl0052).

Der Spiegel, Editorial. (2013). Embassy Espionage: The NSA's Secret Spy Hub in Berlin. Spiegel Online. (www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html)

Domínguez, J. (2016). La ciberguerra como realidad posible contemplada desde la prospectiva. Revista de Pensamiento Estratégico y Seguridad CISDE, 1(1), 18-32. (www.cisdejournal.com)

Elliot, C. (1999). The legality of interception of interception of electronic communications: A concise survey of the principal legal issues and instruments under international, European and national law. PE 168.184 Vol 4/5/EN. Luxemburgo: European Parliament Directorate General for Research. Directorate A. The STOA Programme. (www.europarl.europa.eu/RegData/etudes/etudes/join/1999/168184/DG-4-JOIN_ET(1999)168184_EN.pdf)

Foss, A. B. (2015). New report: Clear signs of mobile surveillance in Oslo, despite denial from Police Security Service. Aftenposten. (www.aftenposten.no/norge/New-report-Clear-signs-of-mobile-surveillance-in-Oslo_-despite-denial-from-Police-Security-Service-61149b.html).

García, I. (2003). Libertad Vigilada: El Espionaje de las Comunicaciones. Ediciones B, Barcelona.

Gallagher, R. (2014). British spy chiefs secretly begged to play in NSA’s data pools. The Intercept. (https://theintercept.com/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/)

Gallagher, R. (2015a). In historic ruling, UK surveillance secrecy declared unlawful. The Intercept. (https://theintercept.com/2015/02/06/surveillance-uk-gchq-unlawful-human-rights/)

Gallagher, R. (2015b). From radio to porn, British spies track web users’ online identities. The Intercept. (https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/)

Gellman, B.; Poitras, L. (2013). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. (www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html)

Gellman, B.; Soltani, A. (2013). NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. The Washington Post. (www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html)

Gellman, B.; DeLong, M. (2013). How the NSA's MUSCULAR program collects too much data from Yahoo and Google. The Washington Post. (http://apps.washingtonpost.com/g/page/world/how-the-nsas-muscular-program-collects-too-much-data-from-yahoo-and-google/543/)

González, M. (2001). La cooperación de la CIA y el FBI contra ETA es aún 'muy incipiente'. Diario El País. (http://elpais.com/diario/2001/06/15/espana/992556005_850215.html)

Greenwald, G. (2013a). NSA collecting phone records of millions of Verizon customers daily. The Guardian. (www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order)

Greenwald, G.; MacAskill, E. (2013). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. (www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data)

Greenwald, G. (2013b). XKeyscore: NSA tool collects 'nearly everything a user does on the internet'. The Guardian. (www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data)

Greenwald, G. (2014). No place to hide. EE.UU: Metropolitan Books. Documentos de Snowden disponibles en: (http://us.macmillan.com/static/holt/greenwald/NoPlaceToHide-Documents-Compressed.pdf)

Hager, N. (1996). Secret Power: New Zealand's Role in the International Spy Network. Nueva Zelanda: Potton & Burton.

Hager, N.; Gallagher, R. (2015). How spy agency homed in on Groser's rivals. Nzherald. (www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11421370)

Johansen, P. A. (2014). Secret surveillance of Norway’s leaders detected. Aftenpost. (www.aftenposten.no/norge/Secret-surveillance-of-Norways-leaders-detected-71828b.html)

Kettle, M.; Campbell, D.; Rollo, J.; Hain, P. (1980). Policing the Police Volume 2. John Calder, Londres.

Leprevost, F. (1999). Encryption and cryptosystems in electronic surveillance: a survey of the technology assessment issues. PE 168.184 Vol 3/5/EN. Luxemburgo: European Parliament Directorate General for Research. Directorate A. The STOA Programme. (www.europarl.europa.eu/RegData/etudes/etudes/join/1999/168184/DG-4-JOIN_ET(1999)168184_EN.pdf)

Ley Orgánica 15/1999, de 13 de diciembre, de Protección de Datos de Carácter Personal. Boletín Oficial del Estado, 14 de diciembre de 1999, núm. 298. (www.boe.es/buscar/pdf/1999/BOE-A-1999-23750-consolidado.pdf)

Ley Orgánica 7/2015, de 21 de julio, por la que se modifica la Ley Orgánica 6/1985, de 1 de julio, del Poder Judicial. Boletín Oficial del Estado, 22 de julio de 2015, núm. 174, páginas 61593 a 61660.

(www.boe.es/diario_boe/txt.php?id=BOE-A-2015-8167)

MacAskill, E.; Borger, J.; Hopkins, N.; Davies, N.; Ball, J. (2013). GCHQ taps fibre-optic cables for secret access to world's communications. The Guardian. (www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa)

McKay, G. (2015). Mobile Network Forensic Analysis. Project “Solo”. Delma. Pág. 8. (http://mm.aftenposten.no/2015/06/23-mobilspionasje/pub/MFA-CP-007-D.pdf)

NDR Norddeutscher Rundfunk, Editorial. (2014). Snowden-Interview: Transcript. NDR. (www.ndr.de/nachrichten/netzwelt/snowden277_page-2.html)

NSA (2003). SIGINT Directors Set Strategic Direction for 5-Eyes SIGINT Enterprise. SIDtoday. (https://theintercept.com/snowden-sidtoday/3008302-sigint-directors-set-strategic-direction-for-5/)

Oficina de Prensa de la Casa Blanca (2016). Declaración del Presidente Obama. (www.whitehouse.gov/the-press-office/2016/12/29/statement-president-actions-response-russian-malicious-cyber-activity)

Oficina de Prensa de la Casa Blanca (2016). Orden Ejecutiva firmada por el Presidente Obama contra intereses rusos. (www.whitehouse.gov/the-press-office/2016/12/29/executive-order-taking-additional-steps-address-national-emergency)

Parlamento Europeo (2000) Debate ante el Parlamento Europeo, Bruselas. (www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+CRE+20000330+ITEM-002+DOC+XML+V0//ES)

Parlamento Europeo (2000). Minuta de la Conferencia de Presidentes, Estrasburgo, 18. (www.europarl.europa.eu/RegData/organes/conf_pres_groupes/proces_verbal/2000/04-13/CPG_PV(2000)04-13_EN.pdf)

Parlamento Europeo. (2009). Reglamento de STOA. PE422.577/BUR. (www.europarl.europa.eu/stoa/webdav/site/cms/shared/1_about/rules/201606/1066262_1_es.pdf)

Parlamento Europeo, Scientific and Technical Options Assessment STOA (1999). Development of surveillance technology and risk abuse of economic information. A Working Document for the STOA Panel, PE 168.184. (www.europarl.europa.eu/RegData/etudes/etudes/join/1999/168184/DG-4-JOIN_ET(1999)168184_EN.pdf)

Parlamento Europeo. Temporary Committee on the ECHELON Interception System (2001). Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)), 128, 133-136, 139. (www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML%20REPORT%20A5-2001-0264%200%20DOC%20PDF%20V0//EN)

Parlamento Europeo (2002). Debate parlamentario. Estrasburgo. (www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+CRE+20021023+ITEM-003+DOC+XML+V0//EN&language=RO)

Pegger, B. (1999). Présentation et analyse. 1) Présentation des quatre études. 2) Analyse: protection des données et Droit de l’Homme dans l’Union Européenne et role du Parlement Européen. PE 168.184 Vol 1/5/EN. Luxemburgo: European Parliament Directorate General for Research. Directorate A. The STOA Programme. (www.europarl.europa.eu/RegData/etudes/etudes/join/1999/168184/DG-4-JOIN_ET(1999)168184_EN.pdf)

Piodi, F.; Mombelli, I. (2014). The ECHELON Affair: The European Parliament and the global interception system 1998 – 2002. European Parliamentary Research Service. Historical Archives Unit. PE 538.877, 14, 23, 26, 36. (www.europarl.europa.eu/EPRS/EPRS_STUDY_538877_AffaireEchelon-EN.pdf)

Real decreto de 14 de septiembre de 1882 por el que se aprueba la Ley de Enjuiciamiento Criminal. Boletín Oficial del Estado, de 17/09/1882, núm. 260. (www.boe.es/buscar/act.php?id=BOE-A-1882-6036)

Stöcker, C.; Horchert, J. (2013). Alles, was man über Prism, Tempora und Co. wissen muss. Spiegel Online. (www.spiegel.de/netzwelt/netzpolitik/prism-und-tempora-fakten-und-konsequenzen-a-909084.html y en http://www.spiegel.de/media/media-34090.pdf)

Stone, J. (2016). ISIS Terrorists Used Disposable Burner Phones, Activated Just Hours Before, To Carry Out Paris Attacks. International Business Times. (www.ibtimes.com/isis-terrorists-used-disposable-burner-phones-activated-just-hours-carry-out-paris-2340265)

Tribunal de Vigilancia de la Inteligencia Extranjera de los EE.UU. (2013). Orden judicial sobre Verizon.

(www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order)

Unión Europea, Directorate-General for Parliamentary Research Services (2014). The ECHELON affair. The European Parliament and the global interception system 1998 - 2002. PE 538.877, 13. (www.europarl.europa.eu/EPRS/EPRS_STUDY_538877_AffaireEchelon-EN.pdf)

U.S. House of Representatives (2016). Executive Summary of Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden, 1. (https://intelligence.house.gov/uploadedfiles/hpsci_snowden_review_-_unclass_summary_-_final.pdf)

Wright, S. (1998). An appraisal of technologies for political control. Luxemburgo: European Parliament Directorate General for Research. Directorate B. The STOA Programme, 19. (http://aei.pitt.edu/5538/)


Enlaces refback

  • No hay ningún enlace refback.


Revista de Pensamiento Estratégico y Seguridad CISDE

ISSN: 2529-8763

www.uajournals.com/cisdejournal

cisdejournal@uajournals.com