SHOCKING REPORT: GOV’T ALSO TAPPING SERVERS OF 9 MAJOR INTERNET COMPANIES TO COLLECT AMERICANS’ DOCUMENTS, PHOTOS, AUDIO
The National Security Agency and FBI are interested in more than just your phone records — they are also interested in your audio, video, photographs, emails, documents, and connection logs, according to a bombshell report from The Washington Post.
The massive Internet surveillance program, code-named “PRISM,” was started in 2007 and we are only now learning about it because an anonymous intelligence officer leaked the information to the paper.
“Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials,” the report notes, “in order to expose what he believes to be a gross intrusion on privacy.”
“They quite literally can watch your ideas form as you type,” the officer said.
But how, exactly, are the feds tapping directly into the central servers and getting their hands on online users’ information? With the assistance of major technology companies, of course:
The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”
For some of these companies, they had no choice but to comply with the feds.
“Formally, in exchange for immunity from lawsuits, companies like Yahoo and AOL are obliged accept a ‘directive’ from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA,” the Post reports.
“In 2008, Congress gave the Justice Department authority … for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company ‘to comply,’” it adds.
In short, the feds could simply strong-arm reluctant tech companies into playing along with the program.
“In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry,” the report continues, “neither side wants to risk a public fight.”
“The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.”
Microsoft became PRISM’s first corporate partner in 2007 while Apple didn’t join until five years later, after the death of Steve Jobs.
The program is so secretive, in fact, that the members of Congress who do know about it are unable comment on it due to their oaths of office.
Here’s how The Washington Post reports the story:
An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.
That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.
Under President Obama, the program has enjoyed “exponential growth” since its founding in 2007 when then-Senator Obama routinely criticized President George W. Bush’s surveillance programs.
“The PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all,” the report notes.
“Analysts who use the system from a Web portal at Fort Meade key in ‘selectors,’ or search terms, that are designed to produce at least 51 percent confidence in a target’s ‘foreignness.’”
“That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, ‘but it’s nothing to worry about,’” it adds.
But there are the really frightening details:
Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as “incidental,” and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect’s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two “hops” out from their target, which increases “incidental collection” exponentially.