ICREACH

Last updated

ICREACH is an alleged top-secret surveillance-related search engine created by the United States National Security Agency (NSA) after the September 11 attacks. [1]

The existence of ICREACH became public through documents leaked by former NSA contractor Edward Snowden. [2]

Classified documents published by news site The Intercept state that ICREACH is accessible to 23 government agencies, including the Federal Bureau of Investigation, Drug Enforcement Administration, and the Central Intelligence Agency, and was designed to store more than 850 billion records about phone calls, emails, cellphone locations, and text messages. [3] [4] [5]

According to Ryan Gallagher, the reporter for The Intercept who revealed the ICREACH program, the data accessed through the system is "swept up and stored on this database en masse using this Reagan-era presidential order, which is called Executive Order 12333. And this thing is subject to no court oversight from the secret foreign intelligence court and minimal congressional scrutiny." [6]

The search engine evolved from two other government tools available for various government agencies, CRISSCROSS and PROTON, the latter with more uses than the former, including viewing the latitude and longitude of phones and headers of emails, while CRISSCROSS was only usable for information on phone calls and could not view the location of the phone. [7]

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Government Communications Security Bureau</span> New Zealand signals intelligence agency

The Government Communications Security Bureau is the public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. The GCSB is considered to be New Zealand's most powerful intelligence agency, and has been alleged to have conducted more espionage and data collection than the country's primary intelligence agency, the less funded NZSIS. This has at times proven controversial, although the GCSB does not have the baggage of criticism attached to it for a perceived failure to be effective like the NZSIS does. The GCSB is considered an equivalent of GCHQ in the United Kingdom or the NSA in the United States.

<span class="mw-page-title-main">UKUSA Agreement</span> Multilateral signals intelligence treaty signed in 1946

The United Kingdom – United States of America Agreement is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intelligence operations is also known as the Five Eyes. In classification markings this is abbreviated as FVEY, with the individual countries being abbreviated as AUS, CAN, NZL, GBR, and USA, respectively.

<span class="mw-page-title-main">Pinwale</span>

Pinwale is the code name for a National Security Agency (NSA) collection and retrieval system for so-called "Digital Network Intelligence", including internet e-mail. It is searchable by monitored NSA analysts.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">XKeyscore</span> Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media news reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support violated acceptable privacy rights, while others dispute or attempt to provide justification for the expansion of surveillance initiatives under his administration.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

TURBINE is the codename of an automated system which enables the United States National Security Agency (NSA) automated management and control of a large surveillance network.

<span class="mw-page-title-main">MYSTIC</span> Secret intelligence program used by NSA (2009–2014)

MYSTIC is a former secret program used since 2009 by the US National Security Agency (NSA) to collect the metadata as well as the content of phone calls from several countries. The program was first revealed in March 2014, based upon documents leaked by Edward Snowden.

CRISSCROSS/PROTON is a top-secret signals intelligence database system used by the Central Intelligence Agency (CIA), the National Security Agency (NSA), the Drug Enforcement Administration (DEA), and the Defense Intelligence Agency (DIA). Its existence was revealed in documents leaked by former NSA contractor Edward Snowden.

Ryan Gallagher is a Scottish investigative journalist. He writes about security and civil liberties for Bloomberg News, and previously worked for The Intercept reporting on classified documents leaked by former National Security Agency contractor Edward Snowden. He has previously worked for The Intercept, The Guardian, Slate, and the Financial Times.

Regin is a sophisticated malware and hacking toolkit used by United States' National Security Agency (NSA) and its British counterpart, the Government Communications Headquarters (GCHQ). It was first publicly revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014. The malware targets specific users of Microsoft Windows-based computers and has been linked to the US intelligence-gathering agency NSA and its British counterpart, the GCHQ. The Intercept provided samples of Regin for download, including malware discovered at a Belgian telecommunications provider, Belgacom. Kaspersky Lab says it first became aware of Regin in spring 2012, but some of the earliest samples date from 2003. Among computers infected worldwide by Regin, 28 percent were in Russia, 24 percent in Saudi Arabia, 9 percent each in Mexico and Ireland, and 5 percent in each of India, Afghanistan, Iran, Belgium, Austria, and Pakistan.

Targeted surveillance is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance. Both untargeted and targeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws, and of failing to pursue security effectively.

ICWATCH is a public database of mainly LinkedIn profiles of people in the United States Intelligence Community. The database was created by Transparency Toolkit and was hosted by WikiLeaks.

References

  1. Gallagher, Ryan (Aug 25, 2014). "The Surveillance Engine: How the NSA Built Its Own Secret Google". The Intercept .
  2. Winter, Michael (Aug 25, 2014). "NSA built 'Google-like' search engine to share data". USA Today .
  3. "CIA colleagues enthusiastically welcome NSA training". The Intercept . Aug 25, 2014.
  4. "Sharing communications metadata across the U.S. Intelligence Community". The Intercept . Aug 25, 2014.
  5. Pullam-Moore, Charles (Aug 25, 2014). "Google-like NSA search engine implemented to learn about civilians". PBS .
  6. Goodman, Amy (Aug 27, 2014). "NSA Creates Google-Like Search Engine to Help Other Agencies Access Collected Phone, Email Records". Democracy Now .
  7. Kayyali, Dia (September 3, 2014). "Newly Revealed NSA Program ICREACH Extends the NSA's Reach Even Further". Electronic Frontier Foundation . Retrieved 8 March 2024.