{"id":187588,"date":"2017-04-13T23:32:11","date_gmt":"2017-04-14T03:32:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cia-and-nsa-first-sought-to-exploit-commercial-databases-in-mid-80s-muckrock\/"},"modified":"2017-04-13T23:32:11","modified_gmt":"2017-04-14T03:32:11","slug":"cia-and-nsa-first-sought-to-exploit-commercial-databases-in-mid-80s-muckrock","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cia-and-nsa-first-sought-to-exploit-commercial-databases-in-mid-80s-muckrock\/","title":{"rendered":"CIA and NSA first sought to exploit commercial databases in mid-80s &#8211; MuckRock"},"content":{"rendered":"<p><p>April 12, 2017  <\/p>\n<p>    Agencies felt databases would provide up-to-the-minute    information at the fingertips of analysts, technical personnel,    and executives.  <\/p>\n<p>    Open Source Intelligence (OSINT) is the least famous, least    exciting, and most prevalent form of intelligence, covering any    sources that are theoretically open to anyone, such as    newspaper articles, published books, or social media posts.    With the ubiquity of the internet, the use of such commercial    databases is beyond routine for both the Intelligence Community    and the government at large, but there was a time, however,    where the mere interest was not only cutting edge, but    problematic.  <\/p>\n<\/p>\n<p>    By June 1985, the NSA had been looking at the issue and decided    to reach out to CIA about it.     The NSA memo, originally marked For Official Use Only, was    sent from the NSA Director directly to the CIA Director,    proposed that they work with the Intelligence Handling    Committee to find a way to exploit open-source, commercial    databases. Unsurprisingly, NSA volunteered to take the lead    in exploring the issue. To the NSA, the benefits were obvious.    The savings in time and manpower  have long been recognized.    They could give up-to-the-minute information at the fingertips    of analysts, technical personnel, and executives.  <\/p>\n<\/p>\n<p>    Given this, it was only natural that the NSA would want to use    this open-source information by integrating commercial    database-derived information into a variety of internal support    programs.  <\/p>\n<p>    The NSA saw several obstacles, including costs and security.    Significantly, in addition to accessing the information, they    would have to devise ways to integrate it, and allow users to    assimilate the information before they would be able to    successfully exploit it. These challenges wouldnt be unique to    any of the agencies in the Intelligence Community, or even the    rest of the government, which led the NSA to conclude that no    one agency should have to deal with these issues alone.  <\/p>\n<\/p>\n<p>    Security would be the major issue, as it included not only the        still-emerging issues of cybersecurity, but also    deniability. How could the NSA and other agencies access these    databases without giving away their interests? NSAs    Information Resources Management Organization had begun looking    into alternatives for rapid secure access to commercial    databases, including data downloading, transmission through a    secure gateway computer or physical data transfers.  <\/p>\n<\/p>\n<p>    For its part, CIA agreed and was already working on some    integrating some commercial databases into its work. The    Foreign Broadcast Information Service (FBIS) was charged with    collecting information from foreign public media, which the    Agency felt included accessing foreign commercial databases.    According to a formerly SECRET memo prepared for the CIA    Director, the project had first begun in 1984.  <\/p>\n<\/p>\n<p>    The pilot project was fairly ambitious, especially for the    time. Not only did it allow the Agency to collect information    more quickly, the pilot project proved that the Agency could    collect new bibliographic and documentary information [that    was] not normally available through regular means of    acquisition. By sampling some 50 online databases contained    in the French Telesystemes-QUESTEL network, the project had    found scientific, technical and economic information that met    FBIS requirements.  <\/p>\n<\/p>\n<p>    FOIA requests have been filed to learn more about these efforts    from the NSA and CIA.  <\/p>\n<p>    Like Mike Bests work? Support him on Patreon.  <\/p>\n<p>    Image via     Flashbak  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.muckrock.com\/news\/archives\/2017\/apr\/12\/cia-and-nsa-commercial-database\/\" title=\"CIA and NSA first sought to exploit commercial databases in mid-80s - MuckRock\">CIA and NSA first sought to exploit commercial databases in mid-80s - MuckRock<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> April 12, 2017 Agencies felt databases would provide up-to-the-minute information at the fingertips of analysts, technical personnel, and executives. Open Source Intelligence (OSINT) is the least famous, least exciting, and most prevalent form of intelligence, covering any sources that are theoretically open to anyone, such as newspaper articles, published books, or social media posts. With the ubiquity of the internet, the use of such commercial databases is beyond routine for both the Intelligence Community and the government at large, but there was a time, however, where the mere interest was not only cutting edge, but problematic.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cia-and-nsa-first-sought-to-exploit-commercial-databases-in-mid-80s-muckrock\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-187588","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187588"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=187588"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187588\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=187588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=187588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=187588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}