Newly released NSA slides explain mechanics of US surveillance Get - TopicsExpress



          

Newly released NSA slides explain mechanics of US surveillance Get short URL Published time: June 30, 2013 03:39 AFP Photo AFP Photo Share on tumblr Trends NSA leaks Tags Information Technology, Intelligence, Politics, Scandal, Security In the latest revelations of the NSA leaks scandal, new slides have emerged thoroughly explaining the targeting process of the US government top-secret PRISM program deployed to spy on communication data of targets operating abroad. The screenshots published by the Washington Post, detail how PRISM tasks are issued by analysts and describes the approval process of an individual requests. To begin with, an NSA analyst "tasks" PRISM to gather information about a surveillance target. The system then temporarily freezes that request and automatically ask for an approval from a supervisor. If the superior decides that the request possesses a "reasonable belief" of perceived threat, then PRISM goes to work. NSA slide published by the Washington Post NSA slide published by the Washington Post In the surveillance process, NSA often obtains its live data from the FBI that retrieves matching information, using government equipment from companies such as Google, Microsoft and Yahoo. With the participation of those companies, PRISM – and therefore Washington intelligence workers – "incidentally" have access to the bulk of Americans’ email, video and voice chat, videos, photos, voice-over-IP (Skype) chats, file transfers and social networking details. For stored data, the FBI deploys its own databases that review the selects request, before it is forwarded to the NSA. NSA slide published by the Washington Post NSA slide published by the Washington Post The information is then analyzed and processed by a system that can interpret voice, text, video and "digital network information.” The FBI interceptions from private firms are also being channeled to more "customers" at the NSA, CIA or FBI. Each target is then assigned a PRISM case notation which reflects the availability of real-time surveillance as well as stored data. NSA slide published by the Washington Post NSA slide published by the Washington Post Depending on the access to private firm’s information, the NSA begins to monitor live notifications of the target’s mobile logs. On the April 5 slide some 117,675 users were targeted in PRISM database. NSA slide published by the Washington Post NSA slide published by the Washington Post Saturday’s revelations expand the slides that were revealed earlier in June, revealing the existence of the PRISM program, which mines data from the nine leading US Internet companies. Earlier information also revealed the world’s electronic communications flow and Washington’s control over providers. The NSA venture does not require individual warrants. It is also court approved and is administered through federal judges who rule on the Foreign Intelligence Surveillance Act (FISA).
Posted on: Mon, 01 Jul 2013 04:31:39 +0000

Trending Topics



Recently Viewed Topics




© 2015