{"id":46853,"date":"2014-09-01T14:41:48","date_gmt":"2014-09-01T13:41:48","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=46853"},"modified":"2015-05-05T21:30:39","modified_gmt":"2015-05-05T20:30:39","slug":"the-surveillance-engine-how-the-nsa-built-its-own-secret-google","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/09\/the-surveillance-engine-how-the-nsa-built-its-own-secret-google\/","title":{"rendered":"The Surveillance Engine: How the NSA Built Its Own Secret Google"},"content":{"rendered":"<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google1.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46854\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google1-1024x494.jpg\" alt=\"nsa private google1\" width=\"724\" height=\"350\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google1-1024x494.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google1-300x145.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google1.jpg 1200w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/p>\n<p>The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a \u201cGoogle-like\u201d search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by <em>The Intercept<\/em>.<\/p>\n<p>The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants.<\/p>\n<p>ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to <em>The Intercept<\/em> by NSA whistleblower Edward Snowden.<\/p>\n<p>Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google2-architecture.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46855\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google2-architecture.png\" alt=\"nsa private google2 architecture\" width=\"692\" height=\"519\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google2-architecture.png 792w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google2-architecture-300x225.png 300w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p>ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/cia-colleagues-enthusiastically-welcome-nsa-training\" >a 2010 memo<\/a>. A planning <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/sharing-communications-metadata-across-u-s-intelligence-community\" >document<\/a> from 2007 lists the DEA, FBI, Central Intelligence Agency, and the Defense Intelligence Agency as core members. Information shared through ICREACH can be used to track people\u2019s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.<\/p>\n<p>The creation of ICREACH represented a landmark moment in the history of classified U.S. government surveillance, according to the NSA documents.<\/p>\n<p>\u201cThe ICREACH team delivered the first-ever wholesale sharing of communications metadata within the U.S. Intelligence Community,\u201d noted <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/icreach-wholesale-sharing-2007\" >a top-secret memo<\/a> dated December 2007. \u201cThis team began over two years ago with a basic concept compelled by the IC\u2019s increasing need for communications metadata and NSA\u2019s ability to collect, process and store vast amounts of communications metadata related to worldwide intelligence targets.\u201d<\/p>\n<p>The search tool was designed to be the largest system for internally sharing secret surveillance records in the United States, capable of handling two to five billion new records every day, including more than 30 different kinds of metadata on emails, phone calls, faxes, internet chats, and text messages, as well as location information collected from cellphones. Metadata reveals information about a communication\u2014such as the \u201cto\u201d and \u201cfrom\u201d parts of an email, and the time and date it was sent, or the phone numbers someone called and when they called\u2014but not the content of the message or audio of the call.<\/p>\n<p>ICREACH does not appear to have a direct relationship to the large NSA database, previously <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\" >reported by <em>The Guardian<\/em><\/a>, that stores information on millions of ordinary Americans\u2019 phone calls under Section 215 of the Patriot Act. Unlike the 215 database, which is accessible to a small number of NSA employees and can be searched only in terrorism-related investigations, ICREACH grants access to a vast pool of data that can be mined by analysts from across the intelligence community for \u201cforeign intelligence\u201d\u2014a vague term that is far broader than counterterrorism.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google3.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46856\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google3.png\" alt=\"nsa private google3\" width=\"692\" height=\"519\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google3.png 792w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google3-300x225.png 300w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p>Data available through ICREACH appears to be primarily derived from surveillance of foreigners\u2019 communications, and planning documents show that it draws on a variety of different sources of data maintained by the NSA. Though <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/cia-colleagues-enthusiastically-welcome-nsa-training\" >one 2010 internal paper<\/a> clearly calls it \u201cthe ICREACH database,\u201d a U.S. official familiar with the system disputed that, telling <em>The Intercept<\/em> that while \u201cit enables the sharing of certain foreign intelligence metadata,\u201d ICREACH is \u201cnot a repository [and] does not store events or records.\u201d Instead, it appears to provide analysts with the ability to perform a one-stop search of information from a wide variety of separate databases.<\/p>\n<p>In a statement to <em>The Intercept<\/em>, the Office of the Director of National Intelligence confirmed that the system shares data that is swept up by programs authorized under Executive Order 12333, a <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2014\/08\/14\/us\/politics\/reagan-era-order-on-surveillance-violates-rights-says-departing-aide.html\" >controversial<\/a> Reagan-era presidential directive that underpins several NSA bulk surveillance operations that monitor communications overseas. The 12333 surveillance takes place with no court oversight and has received minimal Congressional scrutiny because it is targeted at foreign, not domestic, communication networks. But the broad scale of 12333 surveillance means that some Americans\u2019 communications get caught in the dragnet as they transit international cables or satellites\u2014and documents contained in the Snowden archive indicate that ICREACH taps into some of that data.<\/p>\n<p>Legal experts told <em>The Intercept<\/em> they were shocked to learn about the scale of the ICREACH system and are concerned that law enforcement authorities might use it for domestic investigations that are not related to terrorism.<\/p>\n<p>\u201cTo me, this is extremely troublesome,\u201d said Elizabeth Goitein, co-director of the Liberty and National Security Program at the New York University School of Law\u2019s <a target=\"_blank\" href=\"http:\/\/www.brennancenter.org\/\" >Brennan Center for Justice<\/a>. \u201cThe myth that metadata is just a bunch of numbers and is not as revealing as actual communications content was exploded long ago\u2014this is a trove of incredibly sensitive information.\u201d<\/p>\n<p>Brian Owsley, a federal magistrate judge between 2005 and 2013, said he was alarmed that traditional law enforcement agencies such as the FBI and the DEA were among those with access to the NSA\u2019s surveillance troves.<\/p>\n<p>\u201cThis is not something that I think the government should be doing,\u201d said Owsley, an assistant professor of law at Indiana Tech Law School. \u201cPerhaps if information is useful in a specific case, they can get judicial authority to provide it to another agency. But there shouldn\u2019t be this buddy-buddy system back-and-forth.\u201d<\/p>\n<p>Jeffrey Anchukaitis, an <a target=\"_blank\" href=\"http:\/\/www.dni.gov\" >ODNI<\/a> spokesman, declined to comment on a series of questions from <em>The Intercept<\/em> about the size and scope of ICREACH, but said that sharing information had become \u201ca pillar of the post-9\/11 intelligence community\u201d as part of an effort to prevent valuable intelligence from being \u201cstove-piped in any single office or agency.\u201d<\/p>\n<p>Using ICREACH to query the surveillance data, \u201canalysts can develop vital intelligence leads without requiring access to raw intelligence collected by other IC [Intelligence Community] agencies,\u201d Anchukaitis said. \u201cIn the case of NSA, access to raw signals intelligence is strictly limited to those with the training and authority to handle it appropriately. The highest priority of the intelligence community is to work within the constraints of law to collect, analyze and understand information related to potential threats to our national security.\u201d<\/p>\n<p><strong>One-Stop Shopping<\/strong><\/p>\n<p>The mastermind behind ICREACH was recently retired NSA director Gen. Keith Alexander, who outlined his vision for the system in<a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/decision-memorandum-dni-icreach\" > a classified 2006 letter<\/a> to the then-Director of National Intelligence John Negroponte. The search tool, Alexander wrote, would \u201callow unprecedented volumes of communications metadata to be shared and analyzed,\u201d opening up a \u201cvast, rich source of information\u201d for other agencies to exploit. By late 2007 the NSA reported to its employees that the system had gone live as a pilot program.<\/p>\n<p>The NSA described ICREACH as a \u201cone-stop shopping tool\u201d for analyzing communications. The system would enable at least a 12-fold increase in the volume of metadata being shared between intelligence community agencies, the documents <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/sharing-communications-metadata-across-u-s-intelligence-community\" >stated<\/a>. Using ICREACH, the NSA planned to boost the amount of communications \u201cevents\u201d it shared with other U.S. government agencies from 50 billion to more than 850 billion, bolstering an older top-secret data sharing system named CRISSCROSS\/PROTON, which was launched in the 1990s and managed by the CIA.<\/p>\n<p>To allow government agents to sift through the masses of records on ICREACH, engineers designed a simple \u201cGoogle-like\u201d search interface. This enabled analysts to run searches against particular \u201cselectors\u201d associated with a person of interest\u2014such as an email address or phone number\u2014and receive a page of results displaying, for instance, a list of phone calls made and received by a suspect over a month-long period. The documents suggest these results can be used reveal the \u201csocial network\u201d of the person of interest\u2014in other words, those that they communicate with, such as friends, family, and other associates.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google4.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46857\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google4.png\" alt=\"nsa private google4\" width=\"692\" height=\"519\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google4.png 792w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google4-300x225.png 300w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p>The purpose of ICREACH, projected initially to cost between $2.5 million and $4.5 million per year, was to allow government agents to comb through the NSA\u2019s metadata troves to identify new leads for investigations, to predict potential future threats against the U.S., and to keep tabs on what the NSA calls \u201cworldwide intelligence targets.\u201d<\/p>\n<p>However, the documents make clear that it is not only data about foreigners\u2019 communications that are available on the system. Alexander\u2019s memo states that \u201cmany millions of\u2026minimized communications metadata records\u201d would be available through ICREACH, a reference to the process of \u201cminimization,\u201d whereby identifying information\u2014such as part of a phone number or email address\u2014is removed so it is not visible to the analyst. NSA documents define minimization as \u201cspecific procedures to minimize the acquisition and retention [of] information concerning unconsenting U.S. persons\u201d\u2014making it a near certainty that ICREACH gives analysts access to millions of records about Americans. The \u201cminimized\u201d information can still be retained under NSA rules for up to five years and \u201cunmasked\u201d at any point during that period if it is ever deemed necessary for an investigation.<\/p>\n<p>The Brennan Center\u2019s\u00a0Goitein said it appeared that with ICREACH, the government \u201cdrove a truck\u201d through loopholes that allowed it to circumvent restrictions on retaining data about Americans. This raises a variety of legal and constitutional issues, according to Goitein, particularly if the data can be easily searched on a large scale by agencies like the FBI and DEA for their domestic investigations.<\/p>\n<p>\u201cThe idea with minimization is that the government is basically supposed to pretend this information doesn\u2019t exist, unless it falls under certain narrow categories,\u201d Goitein said. \u201cBut functionally speaking, what we\u2019re seeing here is that minimization means, \u2018we\u2019ll hold on to the data as long as we want to, and if we see anything that interests us then we can use it.\u2019\u201d<\/p>\n<p>A key question, according to several experts consulted by <em>The Intercept<\/em>, is whether the FBI, DEA or other domestic agencies have used their access to ICREACH to secretly trigger investigations of Americans through a controversial process known as \u201cparallel construction.\u201d<\/p>\n<p>Parallel construction involves law enforcement agents using information gleaned from covert surveillance, but later covering up their use of that data by creating a new evidence trail that excludes it. This hides the true origin of the investigation from defense lawyers and, on occasion, prosecutors and judges\u2014which means the legality of the evidence that triggered the investigation cannot be challenged in court.<\/p>\n<p>In practice, this could mean that a DEA agent identifies an individual he believes is involved in drug trafficking in the United States on the basis of information stored on ICREACH. The agent begins an investigation but pretends, in his records of the investigation, that the original tip did not come from the secret trove. Last year, Reuters <a target=\"_blank\" href=\"http:\/\/www.reuters.com\/article\/2013\/08\/05\/us-dea-sod-idUSBRE97409R20130805\" >first reported<\/a> details of parallel construction based on NSA data, linking the practice to a unit known as the Special Operations Division, which Reuters said distributes tips from NSA intercepts and a DEA database known as DICE.<\/p>\n<p>Tampa attorney James Felman, chair of the American Bar Association\u2019s criminal justice section, told <em>The Intercept<\/em> that parallel construction is a \u201ctremendously problematic\u201d tactic because law enforcement agencies \u201cmust be honest with courts about where they are getting their information.\u201d The ICREACH revelations, he said, \u201craise the question of whether parallel construction is present in more cases than we had thought. And if that\u2019s true, it is deeply disturbing and disappointing.\u201d<\/p>\n<p>Anchukaitis, the ODNI spokesman, declined to say whether ICREACH has been used to aid domestic investigations, and he would not name all of the agencies with access to the data. \u201cAccess to information-sharing tools is restricted to users conducting foreign intelligence analysis who have the appropriate training to handle the data,\u201d he said.<\/p>\n<div id=\"attachment_46858\" style=\"width: 690px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/langley-cia-headquarters.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46858\" class=\"wp-image-46858\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/langley-cia-headquarters.jpg\" alt=\"CIA headquarters in Langley, Virginia, 2001.\" width=\"680\" height=\"446\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/langley-cia-headquarters.jpg 780w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/langley-cia-headquarters-300x196.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/a><p id=\"caption-attachment-46858\" class=\"wp-caption-text\">CIA headquarters in Langley, Virginia, 2001.<\/p><\/div>\n<p><strong>Project CRISSCROSS<\/strong><\/p>\n<p>The roots of ICREACH can be traced back more than two decades.<\/p>\n<p>In the early 1990s, the CIA and the DEA embarked on a secret initiative called Project CRISSCROSS. The agencies built a database system to analyze phone billing records and phone directories, in order to identify links between intelligence targets and other persons of interest. At first, CRISSCROSS was used in Latin America and was \u201cextremely successful\u201d at identifying narcotics-related suspects. It stored only five kinds of metadata on phone calls: date, time, duration, called number, and calling number, according to <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/metadata-sharing-memorandum-2005\" >an NSA memo<\/a>.<\/p>\n<p>The program rapidly grew in size and scope. By 1999, the NSA, the Defense Intelligence Agency, and the FBI had gained access to CRISSCROSS and were contributing information to it. As CRISSCROSS continued to expand, it was supplemented with a system called PROTON that enabled analysts to store and examine additional types of data. These included unique codes used to identify individual cellphones, location data, text messages, passport and flight records, visa application information, as well as excerpts culled from CIA intelligence reports.<\/p>\n<p>An NSA memo <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/crisscross-proton-point-paper\" >noted<\/a> that PROTON could identify people based on whether they behaved in a \u201csimilar manner to a specific target.\u201d The memo also said the system \u201cidentifies correspondents in common with two or more targets, identifies potential new phone numbers when a target switches phones, and identifies networks of organizations based on communications within the group.\u201d In July 2006, the NSA estimated that it was storing 149 billion phone records on PROTON.<\/p>\n<p>According to the NSA documents, PROTON was used to track down \u201cHigh Value Individuals\u201d in the United States and Iraq, investigate front companies, and discover information about foreign government operatives. CRISSCROSS enabled major narcotics arrests and was integral to the CIA\u2019s rendition program during the Bush Administration, which involved abducting terror suspects and flying them to secret \u201cblack site\u201d prisons where they were brutally interrogated and sometimes tortured. <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/metadata-sharing-memorandum-2005\" >One NSA document<\/a> on the system, dated from July 2005, noted that the use of communications metadata \u201chas been a contribution to virtually every successful rendition of suspects and often, the deciding factor.\u201d<\/p>\n<p>However, the NSA came to view CRISSCROSS\/PROTON as insufficient, in part due to the aging standard of its technology. The intelligence community was sensitive to criticism that it had failed to share information that could potentially have helped prevent the 9\/11 attacks, and it had been strongly criticized for intelligence failures before the invasion of Iraq in 2003. For the NSA, it was time to build a new and more advanced system to radically increase metadata sharing.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google5.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46859\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google5-1024x365.jpg\" alt=\"nsa private google5\" width=\"724\" height=\"259\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google5-1024x365.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google5-300x107.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/09\/nsa-private-google5.jpg 1400w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/p>\n<p><strong>A New Standard<\/strong><\/p>\n<p>In 2006, NSA director Alexander drafted his <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/decision-memorandum-dni-icreach\" >secret proposal<\/a> to then-Director of National Intelligence\u00a0Negroponte.<\/p>\n<p>Alexander laid out his vision for what he described as a \u201ccommunications metadata coalition\u201d that would be led by the NSA. His idea was to build a sophisticated new tool that would grant other federal agencies access to \u201cmore than 50 existing NSA\/CSS metadata fields contained in trillions of records\u201d and handle \u201cmany millions\u201d of new minimized records every day\u2014indicating that a large number of Americans\u2019 communications would be included.<\/p>\n<p>The NSA\u2019s contributions to the ICREACH system, Alexander wrote, \u201cwould dwarf the volume of NSA\u2019s present contributions to PROTON, as well as the input of all other [intelligence community] contributors.\u201d<\/p>\n<p>Alexander explained in the memo that NSA was already collecting \u201cvast amounts of communications metadata\u201d and was preparing to share some of it on a system called GLOBALREACH with its counterparts in the so-called Five Eyes surveillance alliance: the United Kingdom, Australia, Canada, and New Zealand.<\/p>\n<p>ICREACH, he proposed, could be designed like GLOBALREACH and accessible only to U.S. agencies in the intelligence community, or IC.<\/p>\n<p>A top-secret <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/sharing-communications-metadata-across-u-s-intelligence-community\" >PowerPoint presentation from May 2007<\/a> illustrated how ICREACH would work\u2014revealing its \u201cGoogle-like\u201d search interface and showing how the NSA planned to link it to the DEA, DIA, CIA, and the FBI. Each agency would access and input data through a secret data \u201cbroker\u201d\u2014a sort of digital letterbox\u2014linked to the central NSA system. ICREACH, according to the presentation, would also receive metadata from the Five Eyes allies.<\/p>\n<p>The aim was not necessarily for ICREACH to completely replace CRISSCROSS\/PROTON, but rather to complement it. The NSA planned to use the new system to perform more advanced kinds of surveillance\u2014such as \u201cpattern of life analysis,\u201d which involves monitoring who individuals communicate with and the places they visit over a period of several months, in order to observe their habits and predict future behavior.<\/p>\n<p>The NSA agreed to train other U.S. government agencies to use ICREACH. Intelligence analysts could be \u201ccertified\u201d for access to the massive database if they required access in support of a given mission, worked as an analyst within the U.S. intelligence community, and had top-secret security clearance. (According to <a target=\"_blank\" href=\"http:\/\/fas.org\/sgp\/othergov\/intel\/clear-2013.pdf\" >the latest government figures<\/a>, there are more than 1.2 million government employees and contractors with top-secret clearance.)<\/p>\n<p>In November 2006, according to the documents, the Director of National Intelligence approved the proposal. ICREACH was rolled out as a test program by late 2007. It\u2019s not clear when it became fully operational, but <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/cia-colleagues-enthusiastically-welcome-nsa-training\" >a September 2010 NSA memo<\/a> referred to it as the primary tool for sharing data in the intelligence community. \u201cICREACH has been identified by the Office of the Director of National Intelligence as the U.S. Intelligence Community\u2019s standard architecture for sharing communications metadata,\u201d the memo states, adding that it provides \u201ctelephony metadata events\u201d from the NSA and its Five Eyes partners \u201cto over 1000 analysts across 23 U.S. Intelligence Community agencies.\u201d It does not name all of the 23 agencies, however.<\/p>\n<p>The limitations placed on analysts authorized to sift through the vast data troves are not outlined in the Snowden files, with only scant references to oversight mechanisms. According to the documents, searches performed by analysts are subject to auditing by the agencies for which they work. The documents also say the NSA would conduct random audits of the system to check for any government agents abusing their access to the data. <em>The Intercept<\/em> asked the NSA and the ODNI whether any analysts had been found to have conducted improper searches, but the agencies declined to comment.<\/p>\n<p>While the NSA initially estimated making upwards of 850 billion records available on ICREACH, the documents indicate that target could have been surpassed, and that the number of personnel accessing the system may have increased since the 2010 reference to more than 1,000 analysts. The intelligence community\u2019s top-secret \u201cBlack Budget\u201d for 2013, also obtained by Snowden, <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/black-budget-extracts\" >shows<\/a> that the NSA recently sought new funding to upgrade ICREACH to \u201cprovide IC analysts with access to a wider set of shareable data.\u201d<\/p>\n<p>In December last year, a surveillance review group appointed by President Obama <a target=\"_blank\" href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf\" >recommended<\/a> that as a general rule \u201cthe government should not be permitted to collect and store all mass, undigested, non-public personal information about individuals to enable future queries and data-mining for foreign intelligence purposes.\u201d It also recommended that any information about United States persons should be \u201cpurged upon detection unless it either has foreign intelligence value or is necessary to prevent serious harm to others.\u201d<\/p>\n<p>Peter Swire, one of the five members of the review panel, told <em>The Intercept<\/em> he could not comment on whether the group was briefed on specific programs such as ICREACH, but noted that the review group raised concerns that \u201cthe need to share had gone too far among multiple agencies.\u201d<\/p>\n<p>\u2014\u2014\u2014<\/p>\n<p><em>Photo credit: Alexander: Carolyn Kaster\/AP Photo; CIA Headquarters: Greg Mathieson\/Mai\/Mai\/The LIFE Images Collection\/Getty Images<\/em><\/p>\n<p>\u2014\u2014\u2014<\/p>\n<p><em>Documents published with this article<\/em>:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/cia-colleagues-enthusiastically-welcome-nsa-training\" >CIA Colleagues Enthusiastically Welcome NSA Training<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/sharing-communications-metadata-across-u-s-intelligence-community\" >Sharing Communications Metadata Across the U.S. Intelligence Community<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/crisscross-proton-point-paper\" >CRISSCROSS\/PROTON Point Paper<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/decision-memorandum-dni-icreach\" >Decision Memorandum for the DNI on ICREACH<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/metadata-sharing-memorandum-2005\" >Metadata Sharing Memorandum<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/sharing-sigint-metadata-icreach\" >Sharing SIGINT metadata on ICREACH<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/metadata-policy-conference\" >Metadata Policy Conference<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/icreach-wholesale-sharing-2007\" >ICREACH Wholesale Sharing<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/08\/25\/black-budget-extracts\" >Black Budget Extracts<\/a><\/li>\n<\/ul>\n<p>_______________________________________________<\/p>\n<p><em>Ryan Gallagher is a Scottish journalist whose work at <\/em><em>The Intercept<\/em><em> is focused on government surveillance, technology, and civil liberties. His journalism has appeared in publications including <\/em><em>Slate<\/em><em>, the<\/em><em> Guardian<\/em><em>, <\/em><em>Ars Technica<\/em><em>, <\/em><em>Huffington Post<\/em><em>, the <\/em><em>Sydney Morning Herald<\/em><em>, the <\/em><em>Financial Times<\/em><em>, the <\/em><em>Independent<\/em><em>, and the <\/em><em>New Statesman<\/em><em>. Since 2011, Ryan has broken a series of national and international stories about controversial surveillance technologies, shining a light on spy agencies and uncovering links between Western technology firms and governments in repressive countries. He took home an award for his reporting at the 2013 Information Security Journalism Awards and he has received acclaim for his writing on a diverse range of subjects, encompassing everything from the FBI\u2019s attempted infiltration of WikiLeaks to mass protests in Madrid and homelessness in England. Most recently, Ryan has been reporting from Rio de Janerio on the cache of secret files leaked by former National Security Agency contractor Edward Snowden. <\/em><em>Email the author: <a href=\"mailto:ryan.gallagher@theintercept.com\">ryan.gallagher@theintercept.com<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/08\/25\/icreach-nsa-cia-secret-google-crisscross-proton\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a \u201cGoogle-like\u201d search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-46853","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/46853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=46853"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/46853\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=46853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=46853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=46853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}