Image from Google Jackets

Development of surveillance technology and risk of abuse of economic information (an appraisal of technologies for political control): Part 4/4: The state of the art in communications intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to COMINT targetting and selection including speech recognition

By: Contributor(s): Material type: TextTextSeries: PE 168.184/Int.St/Part4/4Publication details: Luxembourg: European Parliament, Direcotorate General for Research, 1999Description: 31pISBN:
  • (pbk.)
Subject(s): Summary: Describes the extent of communications intelligence (COMINT) surveillance especially that carried out by the UKUSA ECHELON system, the principle targets, and the methods of operation. Provides examples of situations in which the USA is said to have used such surveillance for economic advantage. Also identifies a previously secret organisation ILETS (International Law Enforcement Telecommunications Seminar). The technical annexe explains the basics of digital broadband communication, the equipment and software available to access it, the limitations of speech recognition systems as opposed to those that can identify a speaker, and in-built backdoors in common software such as Lotus Notes that enable the USA to read encrypted messages.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Mindef Library & Info Centre On-Shelf 327.12 HOL (Browse shelf(Opens below)) 1 Available 0015010

Describes the extent of communications intelligence (COMINT) surveillance especially that carried out by the UKUSA ECHELON system, the principle targets, and the methods of operation. Provides examples of situations in which the USA is said to have used such surveillance for economic advantage. Also identifies a previously secret organisation ILETS (International Law Enforcement Telecommunications Seminar). The technical annexe explains the basics of digital broadband communication, the equipment and software available to access it, the limitations of speech recognition systems as opposed to those that can identify a speaker, and in-built backdoors in common software such as Lotus Notes that enable the USA to read encrypted messages.

There are no comments on this title.

to post a comment.