NSA secret Google-like search engine for metadata analysis revealed, codenamed ICREACH.
Published: Tue, 26 Aug 2014 by Rad
The United States National Security Agency (NSA) is using a massive information sharing platform that allows multiple law enforcement agencies to infiltrate more than 850 billion communications records detailing e-mails, phone calls, instant messages, and phone geolocation, according to the classified documents disclosed by former intelligence contractor Edward Snowden.
Many of those surveilled data had not been accused of any illegal activity as well. But until now, it is unclear that exact what mechanism was used by the US intelligence agency to share the massive amounts of surveillance data, as well as number of government agencies it was sharing information with.
Although, the classified documents show that the FBI and the Drug Enforcement Administration were the "key participants" in the ICREACH program, but it has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work.
thehackernews
This is not the first time when the ICREACH program has been made public, the Guardian journalist Glenn Greenwald's book named “No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State” also contained a slide among its myriad documents that highlighted the some of the metadata types that were accessible through ICREACH:
The NSA described the ICREACH program as a “one-stop shopping tool” for communications analysis, which generates a portrait of communication patterns associated with a particular piece of information, like a phone number or e-mail address linked to a person.
Resources and related articles
Our previous news stories
- Google updated SAFE BROWSE and now warns of deceptive software downloads that appears to be helpful – that actually does other things.
- Hackers found way to abuse url shortening tool bitly in novelty way. Public API key for bitly misused to redirect users to fake news site.
- Introducing Raspberry Pi model B+, credit-card sized little computer upgraded with additional 2 USB without performance loss for same price
Thought of the day
There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult.
C. A. R. Hoare