Written by: Tech Anonymous

For years we’ve been watching everyone from agent 007 to the mission impossible gang wisp through the world secretly stealing, stashing and performing all sorts of ingenious tricks. They have information on anyone, everyone and everything you can imagine and even some things you don’t even know about. Even Batman had a super “bat” computer he could plug things into and get answers from. Now fast forward to the toddler years of the cyber age as we know it. We went from trying to figure out how to program a microwave oven in the 80’s to wearing Dick Tracy’s two way wrist tv/radio in the palm of our hand in 2014. To make information even more accessible to anyone that’s too scared to use the dewey decimal system at their library, we have internet search engines like, ask, bing, and the gian-tacular…google.

Is it hard to believe that the government really DOES have and maintain some sort of a record system like these that fill the world already? Why not? Is it a new concept? No, not by any means. This whole pile of super-secret, taxpayer money sucking “pie in the sky” started way back when President Ronald Reagan singed executive order 12333 on Dec. 4, 1981. The initial goal of this order is as follows:

“1.1Goals. The United States intelligence effort shall provide the President and the National Security Council with the necessary information on which to base decisions concerning the conduct and development of foreign, defense and economic policy, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal.

(a) Maximum emphasis should be given to fostering analytical competition among appropriate elements of the Intelligence Community.

(b) All means, consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, shall be used to develop intelligence information for the President and the National Security Council. A balanced approach between technical collection efforts and other means should be maintained and encouraged.

(c) Special emphasis should be given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, or United States corporations, establishments, or persons.

(d) To the greatest extent possible consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, all agencies and departments should seek to ensure full and free exchange of information in order to derive maximum benefit from the United States intelligence effort.”*

This would be what opened the door for groups like Homeland security, the NSA and others and gave them the sly “go ahead” to start monitoring anyone they thought could be a threat. Of course, there’s no way to just pick up the threats without monitoring everyone just to see right? Good thing the technology wasn’t quite there yet.

Next on the timeline comes project CRISSCROSS/PROTON in the 1990’s into the early 2000’s. PROTON, used primarily by the CIA, is a storage and analysis system of telecommunications selectors at the TS/SI/FISA/ORCON/NOFORN level of classification and handling (pretty high up on the security food chain) PROTON is the program name as well as the name of the technology.** “CRISSCROSS is the database of telecommunications selectors. Selectors are ( in NSA terms) that information that selects a target for analysis, investigation or collection. Telephone numbers, email addresses, hexadecimal addresses from INMARSAT telephones, IMEI—really any telecommunications “number” or “address” a person would have as a means to contact another, are contained in CRISSCROSS.”** So, It’s not “wheel of fortune” or the “powerball” lottery. There IS supposed to be a process of selection.

Welcome 2014 and Intelligence Community reach or “ICREACH” as it’ s been nicknamed. ICREACH was developed from 2006 and implemented end of 2007, under the leadership of general Keith Alexander ( Director of the NSA1,2 at that time). Supposedly, this program has an interface similar to the Google search engine making access and search capabilities easy for anyone with the correct access I would assume. Allegedly the program is made to “’follow the movements” of selected people, “ to explore personal networks”,” to assist in the prediction of their future actions” and ” potentially reveal their political affiliations or beliefs.

“ok, for what?” You ask; possible terrorist activities? To see if they like waffles? Maybe to check if they had an argument with a neighbor over dog crap in their yard? “How do we know it really exists? Did we catch someone’s home page open?” Well, On 25 August 2014, the American internet newspaper “The Intercept” revealed the existence of this search engine, on the basis of information allegedly provided by Mr. Edward Snowden***. Funny how such an outcast of society (as someone put it) seems to mysteriously keep opening our eyes to such interesting subjects.

There we have it. ICREACH and it’s basic history. Implemented LONG before 9/11/01. Who knows how far it actually reaches. What will we find out next week? Maybe we really do have a “Skynet” software system. The concerted view from this little corner… Is it possible? I would say definitely. Sadly enough, very few of the regular people of the world will ever know that this exists. An even more melancholy thought is that the same majority of sheeple don’t even want to know. The general mindset is that if you live a decent life and obey the laws and don’t make a fuss, you’ll be left alone. I disagree. 30 plus years of history presented above say that YOU are fair game for no reason at all. Who’s to say the eye in the sky won’t tap into all of those itty bitty numbers of some unsuspecting drone and turn him into a terrorist simply to justify government funding?

Watch, listen and learn. Work together. We are Anonymous and we are strong.

____________________________________________________________________

Sources:

http://leaksource.info/2014/08/25/cia-dea-nsa-fbi-dia-project-crisscross-proton/ (crisscross/proton)

*http://www.archives.gov/federal-register/codification/executive-order/12333.html (exec order12333)

**http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

***https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-crisscross-proton/