Comments are now closed due to spamming and personal attacks.

Twitter: https://twitter.com/huffpoclub

NSA slides explain the PRISM data-collection program

Posted on Monday, 1st July 2013 @ 05:25 AM by Text Size A | A | A

The top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA). Some documents describing the program were first released by The Washington Post on June 6. The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies. These slides, annotated by The Post, represent a selection from the overall document, and certain portions are redacted.

New slides published June 29

Acquiring data from a new target

This slide describes what happens when an NSA analyst “tasks” the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the “selectors,” or search terms. The supervisor must endorse the analyst’s “reasonable belief,” defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.

The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA.

For stored communications, but not for live surveillance, the FBI consults its own databases to make sure the selectors do not match known Americans.

This is where data enters NSA systems, described more fully on the next slide.

The Foreign Intelligence Surveillance Court does not review any individual collection request.

See the inner workings of the NSA’s top secret spy program »

Analyzing information collected from private companies

After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and “digital network information” that includes the locations and unique device signatures of targets.

From the FBI’s interception unit on the premises of private companies, the information is passed to one or more “customers” at the NSA, CIA or FBI.

PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records) and MARINA (Internet records).

The systems identified as FALLOUT and CONVEYANCE appear to be a final layer of filtering to reduce the intake of information about Americans.

Each target is assigned a case notation

The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content.

Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as “Surveillance”).

Searching the PRISM database

On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected “incidentally” during surveillance of those targets.

Original slides published June 6

Introducing the program

A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.

The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables.

This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports.

The seal of
Special Source Operations, the NSA term for alliances with trusted U.S. companies.

Monitoring a target’s communication

This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.

Providers and data

The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.

Participating providers

This slide shows when each company joined the program, with Microsoft being the first, on Sept. 11, 2007, and Apple the most recent, in October 2012.

By: Frances J. Norris

Related News On HPUB:

  • Last Call to be the World Leader in Outer Space. by Daniel Bruno

    Last Call to be World Leader First posted: 03/18/2010 at Huffpo “Where is that moon, that leads to your soul?” – Aromabar     Legend has it that Kaguya descended from a race of moon…

  • Electoral Science: The Winner of the 2016 Election Will be a Republican

    Originally published at Washington’s Blog in April, 2016   by Daniel Bruno   Electoral Science: The Winner of the 2016 Election Will be a Republican I was the first person in the world to proclaim…

  • Report from Rio

    Report from Rio Daniel “No Passport” Bruno, reporting from Rio de Janeiro. Daniel is from Manhattan, is an author, inventor, specialist in 9/11 studies, and the interview host at www.hpub.org which publishes over 1000 censored…

  • The New Common Sense. by Daniel Bruno

        Americans need to retire the two party system. Congressional approval ratings hover around 8% yet most members are re-elected over and over again. The old definitions of liberal and conservative, left and right,…

... post your own so far 0 comments

Comments

No comments yet.

Leave a Comment

You must be logged in to post a comment.

 
  • Hpub asks

    • Will Trump Survive to January 1, 2018 ?

      View Results

      Loading ... Loading ...