HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 11 MINUTES AGO.
You are here: Home / Big Data / NSA Uses Google-Like Search Engine
Build Apps 5x Faster
For Half the Cost Enterprise Cloud Computing
On Force.com
NSA Uses Google-Like Search Engine To Share Data
NSA Uses Google-Like Search Engine To Share Data
By Jef Cozza / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
AUGUST
26
2014



The National Security Agency (NSA) has developed its own version of Google to search through the billions of phone calls, e-mails and other electronic communications it monitors, according to a report by The Intercept. The search engine, known as ICREACH, allows government agencies such as the FBI and the U. S. Drug Enforcement Administration (DEA) to sift through -- and share -- the more than 850 billion pieces of metadata it has collected.

The program apparently allows analysts to reverse engineer a person’s network of known associates by revealing who he is in close contact with and the level of his correspondence. The report is based on classified material dating to 2010 given to The Intercept by NSA whistleblower Edward Snowden.

The NSA’s Long ICREACH

ICREACH sifts through information on both foreign nationals and U.S. citizens who do not seem to have been accused or suspected of wrongdoing. According to the report, more than 1,000 analysts at various levels of the government have access to ICREACH, representing more than 20 separate agencies.

A 2006 document written by former NSA head General Keith Alexander describes the program as “one-stop shopping” for communications surveillance. In Alexander’s words, ICREACH gives the government access to “unprecedented volumes of communications metadata to be shared and analyzed.”

The program is designed to search through the metadata attached to digital communications. Metadata includes information such as the sender and recipient of an e-mail, the time and date of transmission, the phone number a caller dials, and in the case of a call made from a mobile phone, the location of the caller. The information allows the government to track where an individual is when he makes a call, who he is talking to, and the length of the conversation.

ICREACH appears to be separate from the so-called 215 database that the NSA uses to store information on phone calls by American citizens. That program is named for section 215 of the Patriot Act, which the NSA says authorized its creation. However, only certain NSA employees are supposed to be allowed to search the 215 database, and then only for terrorism-related investigations. ICREACH, on the other hand, has been made available not only to multiple U.S. intelligence agencies, but also to spies in the United Kingdom.

EO 12333 and Parallel Construction

According to the NSA, the ICREACH program and its database arise from the powers granted it by Executive Order 12333, signed by President Ronald Reagan, granting the agency the authority to engage in the “collection, processing and dissemination of signals intelligence information for counterintelligence purposes.” The Executive Order is not subject to judicial oversight, and receives little scrutiny from Congress. (continued...)

1  2  Next Page >

Tell Us What You Think
Comment:

Name:

Steve Carr:
Posted: 2014-08-28 @ 7:12am PT
I'm shocked that we are spying on other people in the world. This is supposed to be the land of the free, not the land of the NSA. This is out of control, we either stop it now or it's over. Encrypted phones, encrypted email, and search engines are the future. I use the non-tracking leave-me-alone search engine http://LookSeek.com -- a non tracking search engine good for everybody who is making a stance.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Barium Ferrite Is The Future Of Tape: Barium Ferrite (BaFe) offers greater capacity, superior performance, and longer archival life compared to legacy metal particle (MP) tape. Click here to learn more.
MORE IN BIG DATA
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
Using Internet-connected devices without strong passwords is inherently risky, as illustrated by reports that a Russian Web site is showing live footage from thousands of people's webcams.

ENTERPRISE HARDWARE SPOTLIGHT
Doctor Who had K-9, the robot dog that accompanied him on adventures through space. Now, Mountain View has K5, a 5-foot-tall, 300-pound robot security guard patrolling in the Bay Area.

MOBILE TECHNOLOGY SPOTLIGHT
To better its customer service, Comcast is pulling out at least some of the stops. The cable giant has launched an app so you can track the cable guy in real time. It's designed to ease customer frustration.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.