Title: Sharing Communications Metadata Across the US Intelligence Community

Release Date: 2014-08-25

Document Date: 2007-05-15

Description: This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.

Document: This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108

spates °v











*i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€•i©f©*i©f©*i©#3*1C#0*1C#0‘1C#0'1C#C‘1C#0*’C*0 'C*‘K99‘1C#0*1C#C‘1C#^‘1C#C‘1C#C‘1C#^ ^C#©*iC#©*iC#C*’©•©*’©•©*’©•©’©**’©•©•1©#©‘1C#3'1C#©*1©#©*1©'3‘ i©*3 K*i©#0 i©*3' ’C#C

Sharing Communications
Metadata Across the U.S,

Intelligence Community -

ICREACH

15 May 2007





















mc'0 lC#0‘iC?0*iC?C’*iO,0‘*.lCtC>*10,0 'C’C IC’C l©!C*l©t©‘iO?C*1©*0*iO*C*1©^C*i©?C*1©?& i©Vi©?© iC’C 'lOtO“.!©?© *i©*&'iCt©*W© 'Cl 1©?©*1©?© 1©?C*i©t© :ic#0 IC'^C'O'K’O IC’C^C’O ic#c “i©?0 10*0 ^C*C K*0 IC'C'IC’CK’O *1©!©‘1©V1©'0 ^C’C'IC'O ^C'MO*: ^C'O'K’CK'K’C’C’O

loiodiwoi^siot^dioi

This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108

DERIVED FROM: NSA/CSS Manual 1-52, Dated: 20070108, Declassify On: 20320108

UNCLASSIFIED//FOR OFFICIAL USE













mmmmm

mmmmm



mmmmm





10t^:i0T^l0TO*

IOWlOtOâlOICMOlC^1^1^fMlOOiOlCOTOt^lOt^lOlC(Mlv^t^10IOMt^lOt^lOlOMI^lOI^3lOfd1^l^31^«OOlOtO^OIOMlOWWlO«^3lOIOMV^lOlCôlOIOM^IOdlOIO^K)10lOÔlOtOCi10IOOlOlCMKMlOM«Od1WOt^lOt^lOIOn9l9

The Need for Greater 1C

Sharing of Information

1. (U) Recommendations of 9/11 and WMD

Commissions

2. (U) Congressional Interest - IRTPA

3. (U) DNI - A part of 100-Day Plan

4. (U) DoD Information Sharing Strategy

UNCLASSIFEED//FOR OFFICIAL USE ONLY



• (U//FOUO) DCID 8/1, June 2004 - “All IC agencies will
provide intelligence information at the earliest point at
which customers can understand and effectively use it to
support their mission objectives../'

• (U//FOUO) NSA Policy 1 -9, May 2005 - implements DCID
8/1 and Transformation 2.0: “SIGINT information originated
by NSA/CSS shall be shared ... with U.S. Government
customers and partners ... and with Foreign Partners... to
the maximum extent possible, consistent with applicable
statutes, executive orders and regulations, and consistent
with the *need-to-know; principle and with applicable
authorities governing the protection of intelligence
sources and methods.”

UNCLASSIFEED//FOR OFFICIAL USE ONLY

CONFIDENT!AL//REL TO USA, FVÉY//20320108



:iOt©*iOt©*iOt©*iOt$*iotOtio?©

Ô10WÛ1010Û10WÛ1010Ô1010ÔI©

!ïioi»:oioicoiov»ioi»:oiokoioi

nOlOO1OtO^iOtO^iOtO*.iOtO^iOtO31OtOSlOtOSiOlOlOtO;iOtO31O03lO1^l0tO3lOtO3lOtO^lOtO^iOtO3iOt^OtO3lOtO^iO^lO»^tOA.lOtO^iOtO5lO^^iO^WlOtcSot?WtO3iO^loio5lOtO3lOtO31OtO3lOKiOtO^lOtO^iOTO^lOTC»*iOTC>^iOtOSiOtO3l
km ic* •:• •:• •:• •:•■ •:

H0l3ûl0H»10ltiûl010û1010ûl0l

^ioicoioi»:oioi»:oioicoioicoioi»:oioi»:oioicoioi»:oioicoioicoioi»:oio:

SIGINT Dissemination/Sharing

Matrix

■iioicoioi»:oioicoioicoioi»:oioi»:oi»ioi»:oioi

O

if)

Minimized Assessed for FI Shareable
SIGINT Products & Services Yes Yes Yes
SIGINT Communications Metadata* Yes No, but provided for FI purposes Yes
Raw SIGINT No No No

*(C//REL) Communications metadata refers to structured “data about data”: it includes all information associated
with, but not including content, and includes any data used by a network, service, or application to facilitate routing
or handling of a communication or to render content in the intended format; it includes, but is not limited to; dialing,
routing, addressing, or signaling information and data in support of various network management activities (e.g.
billing, authentication or tracking of communicants).

CONFIDENTIAL// RELTO USA, FVEY// 20320108

UNCLASSIFIED//FOR OFFICIAL USE



lOWSlOtttWtO



Sharing Matrix - ICREACH

Minimized Assessed for FI Shareable
COMINT Communications Metadata i Yes C R E No, but provided for FI purposes AC Yes H

UNCLASSIFEED//FOR OFFICIAL USE ONLY





!ïioi»:gioicgioicoioi»:gi©koioi

ÎRH

Building on 1C Success

CONFIDENTEAL//REL TO USA, FVEY//20320108



wmmmmmm

10*^31

I • ¡V ■ *• » ¡V 'ivl 'lyi

'?©!' 1î0i0«r

’TV» «JVI'-**V» »T-«TV» ••V* 'Ivl

)10t©310Vd10w310t©310tW01©3lOl^lWlOWtOMOt©310t^1dlWI©310t0^9WWnOl^10t©)10t^10WnOl©310tOM^10lOMOlOMOl^

ioi»:gioi»:oioicgioicgi©ii:gioi»:gi©:

iioicoioii:gioicoicicoi©ii:gioi»:oi»i©i»:gi©i

Information Sharing

(C//REL) Ensure efficient, effective sharing of ever expanding volumes of
1C communications metadata. The 1C requires access to a much
greater volume of data, for a larger number of analysts.

1. Make more data accessible

2. Wider set of IC Analysts

3. For more comprehensive in-depth
analysis of Communications
Metadata for

• Situational Awareness

• Collection Management

• Target Development

CONFEDENTIAL//REL TO USA, FVEY//20320108

A

1. (U//FOUO) Make IC communications metadata accessible to the

greater IC.

a. Data will be updated and accessible instantly by IC Intelligence
analysts.

b. Data will be provided for foreign intelligence and counter-
intelligence purposes.

c. Data sources and methods can be protected.

d. Data will be minimized* according to each agency’s standards

(e.g. NSA’s data will be minimized to NSA minimization
standards, CIA’s data to CIA minimization standards, etc.).

(U//FOUO) specific procedures to minimize the acquisition and retention, and prohibit the dissemination, of non-
publicly available information concerning unconsenting U.S. persons consistent with the need of the U.S. to
obtain, produce and disseminate foreign intelligence information.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

SECRET//NOFORN//20320108

NSA' S Proposal

2. (S) Handles the ever increasing volumes of communications

metadata (est. 2-5 billion records/day)

3. (S) Incorporates all communication types - telephony and all forms

of digital, e.g. e-mail

4. (U) Allows for the expansion of communications metadata fields

and sources

5. (U) Accommodates multimedia (voice/data/video) convergence

6. (U) Allows for greater access by U.S. DoD military elements

7. (U) Requires only JWICS account plus PKI

8. (S//NF) Does not necessarily replace CrissCross/Proton

9. (C) Allows for incorporation of foreign partner data*

Ms negotiated

SECRET//NOFORN//20320108





jmm ' ' •'* ‘1 « t «**1 ' i ' ‘1 * •;• • • • • • g' M •

Implementation:

ioitf>ittoi9*9oi9iooioi0oioiooioiooioitioioi»ttt2oioitt>ioi

Use of ICREACH

(S//REL) ICREACH is a one-stop
shopping tool for consolidated
communications metadata analytic
needs. Through ICREACH, analysts
can access most tools and all
appropriate data sets related to both
telephony and DNI data with a single
login.

SECRET// RELTO USA, FVEY//20320108



SECRET//COMINT//REL TO USA, FVEY//20320108

5! • rot 'T-2 'r3t *r*3t 'rot 'rot 'rot 'rot 'rot *rot 'rot 'rot 'rot • rot 'rot

•Ot '-Ot ”Ot ,#Ot ’Ot ,#Ot "Ot "Ot ’Ot "Ot ’Ot '*0 "Ot "Ot 'Ot "Ot ’Ot '’Ot ’Ot v ••$! ,#Ot "Ot

NSA Proposal Implementation

Use of ICREACH

Current Status:

(S//REL) ICREACH is an evolving NSA toolkit (middleware)
focused on analyzing the target in a converged telephony-DNI
environment. The federated query searches across all data sets

for information relating to a target identifier.

(S//SI//REL) For example, through ICREACH an analyst could
find all metadata comms related to a target: phone number,
Global Mobile Satellite and cellular events and selectors,
email address, etc. and any associated locational information.

SECRET//COMINT//REL TO USA, FVEY//20320108

UNCLASSIFIED

510*

//FOR OFFICIAL USE ONLY

I ■A * ■ A « A • % a At a A a A a A a A a A a Aa • % a A a % a A a A a A • % a A • A a Ah • % ■ A a A a Ah aAaAaAaA • % ■ A a A a At • % a • % ■ Ah a * a A a A A A a * a #k a % a A a % a A a % a At a A A A a % a A a A A A a A a A a A a A a A a At a A a a A a a A a A a A a A a A a A a A a A a A a * a«a#k a«a#k a A a A a A a A a A a A a A a A» a A a A a A a a A a Ah a A a A a A a A a A a A a A a A a A a A» a A a A a # a A A Ah a A a A» a A a A > I ik

yo

103101031010

1031010310

1010310*31010310

101031010310

101031010310

1010310

0l03l0t010l0010t00101

10103101

101031010310103101

1010310100101010103101

10103101

10103101031031010310103101



J

1. (U) Certify Users

2. (U) Train Users

3. (U) Grant Access to
Users

UNCLASSIFEED//FOR OFFICIAL USE ONLY



1. (U//FOUO) Who can be certified? Any individual who:

a. requires access in support of Agency X mission (as
validated by Agency X POC)

b. is a part of the U.S. IC

c. holds TS/SCI

d. has PKI

e. is an IC-intelligence analyst (of any sort)

2. (U//FOUO) PKI-enabled accounts will be accessible

via JWICS.

UNCLASSIFEED//FOR OFFICIAL USE ONLY



(U//FOUO) NSA will train a cadre of individuals from each agency
who will then go back and train their own users.

(S//SI//REL) Training consists of:

a. Intro to communications metadata to familiarize users with PSTN*,
cell phones, email, IMSIs**, etc.

b. Course to familiarize users with ICREACH tool.

c. Intelligence Oversight training, including minimization.

d. Limitations on use of communications metadata

for operational purposes.

* PSTN = Public Switched Telephone Network
** IMSI = International Mobile Subscriber Identity

SECRET//COMINT//REL TO USA, FVEY// 20320108

UNCLASSIFIED//FOR OFFICIAL USE



ICREACH



1. (U//FOUO) Agency X POCs to approve accounts for

individuals.

2. (U) Accounts expire after three (3) months of

inactivity.

3. (U) Users re-apply and are re-certified annually.

UNCLASSIFEED//FOR OFFICIAL USE ONLY

1

1. (U//FOUO) Approval authorities and auditors at each agency will

conduct the requisite oversight training and then conduct
independent oversight.

2. (U//FOUO) Auditing of agency personnel will be conducted by each

agency. ICREACFI audit records will be pushed by NSA to each
agency in order to perform that task.

3. (U//FOUO) Access will be terminated immediately upon identification

of any violation and will be reinstated only upon re-certification by
the agency approval authority.

4. (U//FOUO) NSA will perform random auditing of IC-wide users to

ensure compliance across the IC and notify Agency X of any non-
compliance.

UNCLASSIFIED//FOR OFFICIAL USE ONLY

SECRET//NOFORN//20320108



oie voiCvoic*»'OiC voic*»'Oic*»'OiO'

oic*»oicvoic*»*oic* oic*»’Oic*»oic voie* oic*»’Oi0'Oic*»’Oic* oic*»*oic*»'Oic voie i'Oic*»’Oic *»*oic* oic*»*oic* oie* oic*»'oic.oic *»oic*»*oic voie *»*oic* oie* oic*»'Oic*»oic*»’Oic* oie voie *>’0ic*»'0i0'0ic *»oic voie *»*oic voie* COiC*‘Oic*»'Oioic*»'Oic*»oic*

(S//NF) Call Events in PROTON

•Total Call Events in NSA PROTON*
Of those:

•Total Call Events Non-NSA

•Total Call Events Non-NSA,
Non-NOFORN, Non-HCS

est. 149 Billion

est. 101 Billion
est. 92,000

1%

□ Non-NSA Events NOT Shareable
with 5 Eyes (NOFORN / HCS)

B Non-NSA Events Shareable with
5 Eyes (Non-NOFORN / Non-HCS)

* For date range 2000-2006, as of early July 2006; some
data has been aged off system

SECRET//NOFORN//20320108

SECRET//COMINT//REL TO USA/FVEY//20320Ï08

mr*

mr*

mr*

mwm

mr*



Current NSA Communications Metadata Holdings

(S//SI//REL) ICReach will share over 850 billion NSA event records at IOC
with an additional 1-2 billion records added dally

Telephony (1999-Apr ’ 07)

Total Call Events est. 711 Billion

Total Call Events from est. 126 Billion

2nd Parties

DNI (2004-Apr s07)

Total Events est. 143 Billion
No DNI yet from 2nd Parties

Call Events

Billions

1999 2000 2001 2002 2003 2004 2005 2006 Jan- Feb- Mar- Apr-

07 07 07 07

Yearly Totals

DNI Events

2004 2005 2006 Jan-07 Feb-07 Mar-07 Apr-07

Yearly Totals

SECRET//COMINT//REL TO USA, FVEY//20320108

SECRET//COMINT//REL TO USA, FVEY//20320108

III

. » iyl . '¡VI . * ¡VI * IV - » ¡v ■ • ' - V* 'tVl'* 'tVl • "
oioicoiCKoioi»:oio:oioi»:oioicoioi>»iOi»»iOiooioiooici»:oici»»iOiooiei»»ioiooioicoioi»»i^»ioi»:oioi»:oioicoioi»»iOiooioicoioi»»ioi»''v • •

Large Scale Expansion of NSA Metadata Sharing

(S//SI//REL) Increases NSA communications metadata sharing
from 50 billion records to 850+ billion records (grows by 1-2 billion
records per day)

□ Projected DNI
■ DNI

□ Projected PSTN

□ PSTN

*(C//REL) Includes Call Events from 2nd Party SIGINT Partners (est. 126 Billion
records)

SECRET//COMINT//REL TO USA, FVEY//20320108

_

s



‘.ioto'ic'0'.iota:

'CO -c: '«•: -co •: «5 'CO 'c: ico e-c

^/m^fWirni^Lm 11111

' ' ■' ■' : ’ ■' ■ ■ ■ ■ ■ ■ I m wmm ■ | ■ ■

Communications Metadata Fields in

OttOt0MOtOWttt1OlOai
ICREACH

(S//NF) NSA populates these fields in PROTON:

• Called & calling numbers, date, time & duration of call

(S//SI//REL) ICREACH users will see telephony metadata* in the following fields:

DATE & TIME

DURATION - Length of Call
CALLED NUMBER
CALLING NUMBER

CALLED FAX (CSI) - Called Subscriber
ID

TRANSMITTING FAX (TSI) -
Transmitting Subscriber ID

IMSI - International Mobile Subscriber
Identifier

TMSI - Temporary Mobile Subscriber
Identifier

IMEI - International Mobile Equipment
Identifier

MSISDN - Mobile Subscriber Integrated

Services Digital Network

MDN - Mobile Dialed Number

CLI - Call Line Identifier (Caller ID)

DSME - Destination Short Message

Entity

OSME - Originating Short Message

Entity

VLR - Visitor Location Register

SECRET//COMINT//NOFORN//20320108

-in™

SECRET//COMINT//REL USA, FVEY//20320108



Fields in

OttOt0MOtOWttt1OlOai
ICREACH

(S//SI//REL) ICREACH telephony metadata fields (con’t):

MCC - Mobile Country Code

MNC - Mobile Network Code

LAC - Local Area Code

CELL ID - Serving Cell Identification

TIMING ADV - Timing Advance Value
(distance from base transceiver)

LAT/LONG - Latitude/Longitude in

degrees and minutes

CALLING FTIN - Forward Terminal

Identification Number

CALLING RTIN - Reverse Terminal

Identification Number

DIALED NUMBER

FWD SIM - Forward Subscriber

Identity Module

REV SIM - Reverse Subscriber

Identity Module

MES TYPE - Message Type

(S//SI//REL) ICREACH users will also see this DNI metadata:

Email addresses Chat handles Date & Time Protocols

SECRET//COMINT//REL USA, FVEY//20320108





na

ÜB

OtC * “C« *

M

...................................................................................ipppp



■. If 'If II ' If* ' If

■ If • If* ■ If

If* • If* *1 If* • If* • If* *1 Ift'rttf

"If I *. Ic*»'l“l1ci If* If*

■If* If* If*

SECRET//COMINT//REL T0 USA, FVEY//20320108 ^

iSSx Increases Number of SIGINT Metadata

if. if*i • if* if*i if* ,if* if*

Modes and Fields Shared

Currently

Shared

ICReach

Expansion

Metadata Field PSTN INMARSAT PCS DNI
Date X X X X
Time X X X X
Duration X
Called Number X
Calling Number X
Called Fax number X
Transmitting Fax number X
IMSI X
TMSI X
IMEI X
MSISDN X
MDN X
CLI X
DSME X
OSME X
VLR X
MCC X
MNC X
LAC X
Cell ID X
Timing Advance X
Lat/Long X X
Calling FTIN X
Calling RTIN X
Dialed Number X
Forward SIM X
Reverse SIM X X
Email Address X
Chat Handle X
Protocols X

SECRETff COMINT//REL TO USA, FVEY//20320108

SECRET//REL TO USA, FVEY//20320108

ICREACH Log-in

DYNAMIC PAGE HIGHEST POSSIBLE CLASSIFICATION IS

ICREACII Version 1.0 Released March 2006

(S) IC EJEAl H is a one-stop shopping tool for consolidated metadata analytic needs Through IC REAL H. analysts can access several data sets related to

both telephony and DNI data with a single login and a federated query that returns any available data from multiple sources For more information, please

review the IC REACH FA1,'s

ICREACH Login

Click only if your

.-•EL1

certs axe imported

Request a ICREACH User Account

Password

into your browser

hange my ICREA'-H Password

PKI Login

Update my ICREACH Account Information

Login I Reset |

Click here for instructions on how to obtain your personal certificate to use PKI

Software Development by: TAC/TDS

Last Modified: U6 Januaiy 2000

Derived From

NSA/CSSM 1-52

information Owner

Last Reviewed: 2c, December 200 •

Dated

23 Nov 2004

Database PM:

version: 1 0

DECLASSIFY ON

20291123

Pare Publisher:

Marhmr :

Ke iHetl l inks:

Target L'evelopment L-ervices

Taiget Analysis

entei

■—— = IC „Reach 1 .O Netscape
1^. Rie £dit View go Bookmarks Tools Window Help I

1 j Search |
^ ES» M Mail ai Home (TD Radio (**yl Netscape Search P"1 Bookmarks ^ N5A News ^ Yeeha P"1 Search Tools SEARCHLIGHT ^ Web Help V Service
I IC_Reach 1.0 | ^ (U//FOUO) Target Development Services (... j □

SECRET//REL TO USA, FVEY//20320108

: • ;• •*. ■ : * • ;• ;• *.> ;• : ;• ;• :• ;• ;• ■ • ;» *c*0 ’C*C *C*C *C*0 'C*0 ‘



ICREACH



SECRET//NOFORN//20320108

TOP SECRET//COMINT//NOFORN//20320108

^C#C ’C#C iC#0 ^C* ic#c 'C*0 iC*S ’C*C iC'O ^C*0 ICC 'C*^ 1C#C *C*C 1C*0 ^C* iC#3'iC*0 ^C’t *C*0 1C#C *C*C 1C*0 iC*3'^C*0 ^C’t ’C#C ^C'O *C*0 10V1C#0 1C*S'^C*0 ^C’C ’C*C 1C*0 *C*0 K ’C*0 ’C*0 iC’t K\

ICREACH Query Summary

TOP SECRET//COMINT//NOFORN 20320108

1C*C' 1C



ICREACH

Results

¿jArtSOj,

TOP SECRET//COMINT//NOFORN//20320108

CONFIDENTEAL//REL TO USA, FVEY//20320108



ICREACH ARCHITECTURE



NSA

Display

Middleware

Data

CONFIDENTIAL//REL TO USA, FVEY//20320108

3El«KC I //l'JUrUK|\l//¿U¿¿UJ.Uü

ICREACH ARCHITECTURE

Æ

NSA

CIA

PROTON

Future

Broker

Tools

Data



DO "i O ir
CO



5-Eyes

Shareable

FBI

DIA

DEA

Global IC
Analytic
Community



ICReach 2.0



--

Future Tools:

□ Pattern of Life

□ Target Alerting

□ Results

SORTINGLEAD



SCORECARD

Content

Preparation

Environment

SECRET//NOFORN//20320108

SECRET//COMINT//REL TO USA, FVEY//20320108

Recap



• w.n w.n 9 tv* 10 tooioto * }tO“n 9t0*10t0010t0*t< }td10T0"1< moio?o?t< 9t0*10t0010t0*t< 9to*iotoaioto*a>i< }td10T0"1< >teoio?o*i< 9t0*10t0010t0*t< Î'OK'.V w.n
I0'«V IIJ01 I01CO1 ICI ICI ioicoi ioicoi ICI ICI IC1CO* ICI lOW lOW ICI I0'«v IIJ01 ICI I01CO! ICI I01CO1 I01CO1 ICI ICI ICI I01CO1 I01CO1 ICI ICI i oooi ICI lOW ICI lOW lOW ICI ICI VOV*V ioiw ICI

• (C//REL) ICREACH is a large scale expansion of communications metadata
shared with IC partners

• (C//REL) Enables federation of community metadata across 1C agencies

• (C//REL) Makes greater use of NSA's communications metadata which is

information about content (but not the content itself)

- Definition: Information used by networks, services, or applications to route
communications or make the content usable including:

• Dialing, routing, addressing, location, or signaling data used for network management

• Formats and protocols used to render the information for people and systems

• (S//SI//REL) Expands NSA sharing in three dimensions:

- Includes more modes of communications (PSTN, INMARSAT, PCS, DNI)

- 5x increase in types of metadata shared (from 5 fields to 33 fields)

- 12x increase in volume shared (from 50 billion to 800+ billion records)

SECRET//COMINT//REL TO USA, FVEY//20320108

• (U) Pilot development underway - IOC June

• (U) CCP Funded for first year

• (U//FOUO) Agreements on 2nd Party sharing (bi-
directional)

• (U) Expansion to open source?

• (U//FOUO) Limitations and responsibilities related
to operational use

• (U) Software licensing

UNCLASSIFEED//FOR OFFICIAL USE ONLY

SECRET//NOFORN//20320108

VSSSttSU*





C •©'10 t©* 1©*©“ 1©*©* i©t©‘ 1©*©' l©*0’ i©t©* 1©*©“ i©t©* 1©*©“ 1©T©* 1©T©“ 1©*©* i©î©' 1© t©1©t©©1©l©3 10 #©*i©î©*W©*l©t©* 1©*©* 10*©*i©t©* 1©*©* i©t©* 1©*©“ 1©|©©1©fO 1©?©* 1©#©*i©t©* 1©*©' i©t©* 10*0* 1010* 10*0 *1©*©: 1©T©“ 1©!©“ 1©?©*1©*©* 1©** 1©#©* l©t©* l©,©*^©t©*l©t©‘iO*©“l©t©‘l©*l©*©‘i©#©'iCtC';©

*. 1©*»'**>1C H'OiC 1C01©1»*01© ICÛlOUttl© H'OiC l'Oie 1Cfl1©1»!01©:A1©1»:fl1© 1C01©1»!A1© 1»'rti©i 'Oie 1C01© UtOIOUttlOlOûl© !»'0iCK0lCl'01C1»'
Preliminary Thinking on ICREACH Roll-out

(S//NF) From date of sponsorship:

• Train the trainers

• Account Set-up

• Scrub PROTON NOFORN data for release to ICREACH & Second Parties

• Establish ICREACH Configuration Control Board (CCB) across 1C

(U//FOUO) 2008:

• Reach out to other databases

• ICREACH Enhancements

SECRET//NOFORN//20320108



ICREACH Timeline



(U//FOUO) 2005

• Fall: initiative conceptualized

• Dec: Informally proposed to CIA DIR who suggests staffs meet to
discuss it and consider other options before submitting to DNI

(U//FOUO) 2006

• Spring-Summer: discussions with policy reps & technical experts from
several U.S. 1C agencies; broached with Second Parties

• Summer-Fall: briefed Program Manager/lnfo Sharing Environment,
ODNI/CIO/Info Sharing & Customer Outreach, & ODNI/CIO/IC Enterprise
Architecture

• Oct: formally proposed to DNI

• Late Nov: interim response from DNI, recommending we continue
working initiative with ODNI/CIO & DDNI/Collection

(U) 2007

May: Pilot development begins
June: Pilot IOC

UNCLASSIFIED//FOR OFFICIAL USE ONLY

aaidissviDNn

S0DMS leuouippv

O- • Di Du.*.*» Ole.** Ole*« • Di • 0iv*«**0i'.*-** -1- • Di ■.* i9^*u0lu> •0U^«H0lu|< • 3iv*- Dit,*. •3i^ldiu •OlV*UOlu • di'.*. »9^«u9iv • *Diy.**Dk .'•

• • ■

tftui

adidissvom

1

(S//REL) ICREACH requires between $2.7M and $3.9M in FY07 to implement the
initial phase, depending on the pace of the development effort.

FY2007

Following Sponsorship 30 days

60 days

90 days

120 days

150 days

1.0
2.0

Phase 1

• Establish IT and training POCÿ s across the
IC

• Add DNI and other NSA data sources (e.g.,
PCS, GNDB) to Federated Query Service

• PKI Validation and Acct Establishment
Process

• Design User and Metadata Use Training
Course

3.0

Phase 3

• Transition and Integrate ICR to
Operational Hardware

• Initiate User training sessions (Final
schedule & staffing requirement: TBD)


3.1

Phase 4 and out years

• Develop interface with IC data
sources and brokers

• Enhancements to improve
analytic tool integration

Phase 2

• Code and Test User Interface (Ul) and
Web Service

• Test Account Authentication and
Security for User Interface

• Conduct “Train the Trainer” for Ul
and Account Management process

Phase 3.1

• Optimize hardware
performance

SECRET//REL TO USA, FVEY//20320108

ICtClCC

SECRET//NOFORN//20320108

i «tvi*• 'tvi • 'ivi '¡vi - *iyi *!vi • iyi "ivi ■ • ¡v• *ivi «iv - 'iyi - *¡v• «iv* • • ivi »ivi • 'tvi ’ivi «iv• - *ivi »ivi • ’ivi 'ivi • ’ivi *- >ivi* «¡vi - >ivi 'ivi • >ivi »ivi • *iv• *ivi «iv • * *ivi *iv* - • ivi 'ivi» >iv - 'ivi ■ «*v> • 'tvi -1 iyi 'iv* -1 ¡v* • >tvi'. »i'» «ivi■- *iv• •»ivi•

'CO *c#0 ICC 'CO'CC 'CO 'CO ICC *CC ^C'O 'C 'CO 'CC 'CO 'CO ICC 'CC 'CO 'CO 'CC 'CO'OVC 'CC 'CO 'C ICO 'CO'CC 'CO'OtC 'CC 'CO 1C'0 'CO'CC 'CC'CO ICO *C *C0 'CC 'CO 'CC IC'C^C'O 'CO T'CO *C#0 'CC

ICReach Post Deployment 1 Schedule

----------------FYim----------------

FY08

Schedule to be determined

Deployment 1 Life Cycle Support

Estimated Life Cycle (per year: 1- 5) = $2.5 - 4.5M

2JL

Post Deployment 1 Activity

• Develop interface with IC data sources and brokers

• Second Party Brokers (as made available)

• PROTON Data Broker

• Other IC Agency Data Brokers

• Enhancements to improve analytic tool integration

Resources

1 FTEUSGPM

.25 FTE Account Access

1.0 FTE GUI

.5 FTE Web Service
.5 FTE Config Mgt and Test

1.0 Training Development

.5 Database Engineer/Admin

Estimated NRE Cost

4.75 FTE = $1.350M
Hardware = TBD

SECRET//NOFORN//20320108

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh