[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help]
Status: Not Logged In; Sign In
Dead Constitution See other Dead Constitution Articles Title: U.S. intelligence mining data from nine U.S. Internet companies in broad secret program By Barton Gellman and Laura Poitras, Thursday, June 6, 4:43 PM E-mail the writer The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a persons movements and contacts over time. The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who knew about PRISM were bound by oaths of office to hold their tongues. An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSAs Signals Intelligence Directorate, described the new tool as the most prolific contributor to the Presidents Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, NSA reporting increasingly relies on PRISM as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports. That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil. The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple. PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war. Dropbox , the cloud storage and synchronization service, is described as coming soon. Government officials declined to comment for this article. Roots in the 70s PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric. The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up metadata address packets, device signatures and the like as it streams past choke points along the backbone of the Internet. BLARNEYs top-secret program summary, set down alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks. But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over exponential growth in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques. Poster Comment: Page 2 at link Post Comment Private Reply Ignore Thread Top Page Up Full Thread Page Down Bottom/Latest Begin Trace Mode for Comment # 1.
#1. To: All (#0)
I like seeing these things being reported in the MSM. Better late than never.
There are no replies to Comment # 1. End Trace Mode for Comment # 1.
Top Page Up Full Thread Page Down Bottom/Latest |
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
|