HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED ABOUT A MINUTE AGO.
You are here: Home / Big Data / NSA Uses Google-Like Search Engine
Build Apps 5x Faster
For Half the Cost Enterprise Cloud Computing
On Force.com
NSA Uses Google-Like Search Engine To Share Data
NSA Uses Google-Like Search Engine To Share Data
By Jef Cozza / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
AUGUST
26
2014



The National Security Agency (NSA) has developed its own version of Google to search through the billions of phone calls, e-mails and other electronic communications it monitors, according to a report by The Intercept. The search engine, known as ICREACH, allows government agencies such as the FBI and the U. S. Drug Enforcement Administration (DEA) to sift through -- and share -- the more than 850 billion pieces of metadata it has collected.

The program apparently allows analysts to reverse engineer a person’s network of known associates by revealing who he is in close contact with and the level of his correspondence. The report is based on classified material dating to 2010 given to The Intercept by NSA whistleblower Edward Snowden.

The NSA’s Long ICREACH

ICREACH sifts through information on both foreign nationals and U.S. citizens who do not seem to have been accused or suspected of wrongdoing. According to the report, more than 1,000 analysts at various levels of the government have access to ICREACH, representing more than 20 separate agencies.

A 2006 document written by former NSA head General Keith Alexander describes the program as “one-stop shopping” for communications surveillance. In Alexander’s words, ICREACH gives the government access to “unprecedented volumes of communications metadata to be shared and analyzed.”

The program is designed to search through the metadata attached to digital communications. Metadata includes information such as the sender and recipient of an e-mail, the time and date of transmission, the phone number a caller dials, and in the case of a call made from a mobile phone, the location of the caller. The information allows the government to track where an individual is when he makes a call, who he is talking to, and the length of the conversation.

ICREACH appears to be separate from the so-called 215 database that the NSA uses to store information on phone calls by American citizens. That program is named for section 215 of the Patriot Act, which the NSA says authorized its creation. However, only certain NSA employees are supposed to be allowed to search the 215 database, and then only for terrorism-related investigations. ICREACH, on the other hand, has been made available not only to multiple U.S. intelligence agencies, but also to spies in the United Kingdom.

EO 12333 and Parallel Construction

According to the NSA, the ICREACH program and its database arise from the powers granted it by Executive Order 12333, signed by President Ronald Reagan, granting the agency the authority to engage in the “collection, processing and dissemination of signals intelligence information for counterintelligence purposes.” The Executive Order is not subject to judicial oversight, and receives little scrutiny from Congress. (continued...)

1  2  Next Page >

Tell Us What You Think
Comment:

Name:

Steve Carr:
Posted: 2014-08-28 @ 7:12am PT
I'm shocked that we are spying on other people in the world. This is supposed to be the land of the free, not the land of the NSA. This is out of control, we either stop it now or it's over. Encrypted phones, encrypted email, and search engines are the future. I use the non-tracking leave-me-alone search engine http://LookSeek.com -- a non tracking search engine good for everybody who is making a stance.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN BIG DATA
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
Sony is no stranger to breaches. Sony’s PlayStation Network was hacked in 2011 and attackers obtained 77 million user accounts. The latest attack comes against Sony Pictures Entertainment.

ENTERPRISE HARDWARE SPOTLIGHT
Chinese computer maker Lenovo got creative with the marketing campaign around its Yoga 3 Pro. Lenovo hired the Upright Citizens Brigade, a comic troupe, to help drum up visibility for its new device.

MOBILE TECHNOLOGY SPOTLIGHT
In its bid for the wearables market, Sony is reportedly developing a watch made out of electronic paper for release as soon as next year. The e-paper watch will emphasize style over tech innovations.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.