ICWatch

Last updated
ICWATCH
Available inEnglish
Created byTransparency Toolkit
URL icwatch.wikileaks.org
CommercialNo
LaunchedMay 6, 2015;9 years ago (2015-05-06)
Current statusOffline [1]
Written in

ICWATCH is a public database of mainly LinkedIn profiles of people in the United States Intelligence Community. The database was created by Transparency Toolkit and was hosted by WikiLeaks. [3]

Contents

Background

The publication of global surveillance disclosures in 2013 revealed code names for surveillance projects including MARINA and MAINWAY. [4] [5] It was then discovered that the LinkedIn profiles of individuals in the intelligence community mentioned these code names as well as additional ones. [6] [7] Transparency Toolkit took advantage of this and automated the collection of LinkedIn profiles mentioning such code names, collating them into a searchable database. [3] [8] [9]

Name

The name "ICWATCH" is a play on ICREACH, an alleged top-secret, surveillance-related search engine created by the United States National Security Agency (NSA) after the September 11 attacks. [3] [10]

History

The initial commit to the Git repository of LookingGlass was made on August 23, 2014. [11] LookingGlass is a search tool that was built for use in ICWATCH. [8]

ICWATCH launched on May 6, 2015; [12] on the same day, Transparency Toolkit, the group that created ICWATCH, presented it at the re:publica conference. [3] At launch, the database contained information from over 27,000 LinkedIn profiles. [3] [13]

By mid-May 2015, Transparency Toolkit began receiving requests from individuals to be removed from ICWATCH, including death threats. [14] Following the threats as well as distributed denial-of-service attacks made against the site, WikiLeaks began hosting the website and database by the end of May 2015. [14] [15]

In August 2016 TechCrunch reported that LinkedIn was suing 100 unnamed individuals who had scraped LinkedIn's website, and named ICWATCH as a possible target. [16]

As of February 2017, the database tracked over 100,000 profiles from LinkedIn, Indeed, and other public sources. [17]

In November 2022, ICWATCH and other datasets became unavailable on the WikiLeaks website. [18] [19]

Features

The database can be searched using the company, location, industry, and other parameters of the intelligence workers. [3]

Findings

Most of the discovered profiles are not of those in the National Security Agency but of those working for contractors. [3]

The project also revealed possible trends in employment in the intelligence community. For instance, the "number of people claiming to work with SIGINT databases [...] has increased dramatically over the years since 2008, with just a small decline starting in 2013." [3]

M. C. McGrath of Transparency Toolkit believes that the workers are "for the most part, pretty normal people". [3]

Reception

Ian Paul of PC World voiced concern for the safety of the individuals listed in the database. [13]

See also

Related Research Articles

<span class="mw-page-title-main">United States Foreign Intelligence Surveillance Court</span> U.S. federal court

The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Terrorist Surveillance Program</span> NSA program

The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a U.S. person. In 2005, The New York Times disclosed that technical glitches resulted in some of the intercepts including communications which were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, described how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA employee Bill Binney said that his colleagues told him that the NSA had begun storing billing and phone records from "everyone in the country."

Parallel construction is a law enforcement process of building a parallel, or separate, evidentiary basis for a criminal investigation in order to limit disclosure as to the origins of an investigation.

<span class="mw-page-title-main">WikiLeaks</span> News leak publishing organisation

WikiLeaks is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by Julian Assange, an Australian editor, publisher, and activist. Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief. Its website states that it has released more than ten million documents and associated analyses. WikiLeaks' most recent publication of original documents was in 2019 and its most recent publication was in 2021. From November 2022, numerous documents on the organisation's website became inaccessible. In 2023, Assange said that WikiLeaks is no longer able to publish due to his imprisonment and the effect that US government surveillance and WikiLeaks' funding restrictions were having on potential whistleblowers.

<span class="mw-page-title-main">Techdirt</span> American Internet blog

Techdirt is an American Internet blog that reports on technology's legal challenges and related business and economic policy issues, in context of the digital revolution. It focuses on intellectual property, patent, information privacy and copyright reform in particular.

<span class="mw-page-title-main">Laura Poitras</span> American director and producer of documentary films

Laura Poitras is an American director and producer of documentary films.

WikiLeaks, a whistleblowing website founded by Julian Assange, has received praise as well as criticism from the public, hacktivists, journalist organisations and government officials. The organisation has revealed human rights abuses and was the target of an alleged "cyber war". Allegations have been made that Wikileaks worked with or was exploited by the Russian government and acted in a partisan manner during the 2016 U.S. presidential election.

<span class="mw-page-title-main">William Binney (intelligence official)</span> Former U.S. intelligence official and cryptoanalyst; whistleblower

William "Bill" Edward Binney is a former intelligence official with the United States National Security Agency (NSA) and whistleblower. He retired on October 31, 2001, after more than 30 years with the agency.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden is a former American NSA intelligence contractor and a whistleblower who leaked classified documents revealing the existence of global surveillance programs. He became a naturalized Russian citizen in 2022.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Reactions to global surveillance disclosures</span>

The global surveillance disclosure released to media by Edward Snowden has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. In August 2013, U.S. President Barack Obama announced the creation of "a review group on intelligence and communications technologies" that would brief and later report to him. In December, the task force issued 46 recommendations that, if adopted, would subject the National Security Agency (NSA) to additional scrutiny by the courts, Congress, and the president, and would strip the NSA of the authority to infiltrate American computer systems using "backdoors" in hardware or software. Geoffrey R. Stone, a White House panel member, said there was no evidence that the bulk collection of phone data had stopped any terror attacks.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">ANT catalog</span> Classified catalog of hacking tools by the NSA

The ANT catalog is a classified product catalog by the U.S. National Security Agency (NSA) of which the version written in 2008–2009 was published by German news magazine Der Spiegel in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of espionage devices and spying software were published. The items are available to the Tailored Access Operations unit and are mostly targeted at products from US companies such as Apple, Cisco and Dell. The source is believed to be someone different than Edward Snowden, who is largely responsible for the global surveillance disclosures during the 2010s. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as open-source hardware and software.

<span class="mw-page-title-main">FISA Improvements Act</span>

The FISA Improvements Act is a proposed act by Senator Dianne Feinstein, Chair of the Senate Intelligence Committee. Prompted by the disclosure of NSA surveillance by Edward Snowden, it would establish the surveillance program as legal, but impose some limitations on availability of the data. Opponents say the bill would codify warrantless access to many communications of American citizens for use by domestic law enforcement.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support violated acceptable privacy rights, while others dispute or attempt to provide justification for the expansion of surveillance initiatives under his administration.

Targeted surveillance is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance. Both untargeted and targeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws, and of failing to pursue security effectively.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

References

  1. "WikiLeaks' Website Is Falling Apart". Gizmodo. 22 November 2022. Retrieved January 2, 2023.
  2. "Transparency Toolkit". GitHub . Retrieved February 22, 2017.
  3. 1 2 3 4 5 6 7 8 9 Joseph Cox (May 7, 2015). "This Database Gathers the Resumes of 27,000 Intelligence Workers". Vice.com. Motherboard. Retrieved February 22, 2017.
  4. Barton Gellman (June 15, 2013). "U.S. surveillance architecture includes collection of revealing Internet, phone metadata". The Washington Post . Retrieved February 26, 2017.
  5. Mike Masnick (June 17, 2013). "Why The NSA and President Bush Got the FISA Court to Reinterpret the Law in Order to Collect Tons of Data". Techdirt. Retrieved February 26, 2017.
  6. Christopher Soghoian (June 15, 2013). "Tweet by @csoghoian". Twitter. Retrieved February 26, 2017. Linkedin profiles of people in Maryland that mention MARINA & NUCLEON have some fun other codenames like TRAFFICTHIEF
  7. Mike Masnick (June 18, 2013). "Discovering Names of Secret NSA Surveillance Programs Via LinkedIn". Techdirt. Retrieved February 26, 2017.
  8. 1 2 Rob O'Neill (May 6, 2015). "LinkedIn serves up resumes of 27,000 US intelligence personnel". ZDNet. Retrieved February 22, 2017.
  9. Kalev Leetaru (August 13, 2016). "Is Government Secrecy Dead in the Internet and Social Media Era?". Forbes. Archived from the original on February 22, 2017. Retrieved February 22, 2017. Last year the Transparency Toolkit released ICWATCH, a searchable database of more than 27,000 intelligence community employees, culled entirely from keyword searches of information IC employees uploaded themselves to LinkedIn. Indeed, ICWATCH demonstrated that myriad highly classified programs were openly listed on LinkedIn profiles, often with enough contextual information to at least guess at their application area.
  10. Gallagher, Ryan (Aug 25, 2014). "The Surveillance Engine: How the NSA Built Its Own Secret Google". The Intercept . Archived from the original on June 12, 2015. Retrieved February 26, 2017.
  11. M.C. McGrath (Shidash) (August 23, 2014). "First version". GitHub.
  12. M.C. McGrath (May 6, 2015). "ICWATCH". Transparency Toolkit. Retrieved February 22, 2017.
  13. 1 2 Ian Paul (May 7, 2015). "New database taps LinkedIn to watch the NSA watchers". PCWorld. Retrieved February 22, 2017.
  14. 1 2 Rob O'Neill (May 19, 2015). "Death threat, FBI complaint greet launch of intelligence community database". ZDNet. Retrieved February 22, 2017.
  15. "The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program". Democracy Now!. May 28, 2015. Retrieved February 22, 2017.
  16. Kate Conger (August 15, 2016). "LinkedIn sues anonymous data scrapers". TechCrunch . Retrieved February 22, 2017.
  17. "ICWATCH". Transparency Toolkit. Retrieved February 22, 2017.
  18. Thalen, Mikael (2022-11-22). "Millions of documents disappear from WikiLeaks as site completely breaks down". The Daily Dot. Retrieved 2023-02-19.
  19. "WikiLeaks' Website Is Falling Apart". Gizmodo. 2022-11-22. Retrieved 2023-02-19.