The government has a secret system, a MACHINE.

A place for more serious off-topic discussion and debates.
Post Reply
User avatar
Posts: 20188
Joined: June 2010
Location: The White City
http://www.washingtonpost.com/investiga ... story.html

First page:
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who knew about PRISM were bound by oaths of office to hold their tongues.

Graphic

NSA slides explain the PRISM data-collection program
Related stories
‘No Such Agency’ spies on the communications of the world

Anne Gearan 4:35 PM ET
The National Security Agency, nicknamed such for years, is the U.S. government’s eavesdropper-in-chief.
Report: NSA asked Verizon for all U.S. call data

Ellen Nakashima 6:51 AM ET
If document requiring company to submit phone records for millions of Americans is authentic, it would be the broadest surveillance order known to date.
All about the NSA surveillance program.

Timothy B. Lee 2:46 PM ET
What has the government been doing? Is it legal? Does it mean some bureaucrat somewhere has heard all your phone calls? Read on to find out.
Administration, lawmakers defend NSA program to collect phone logs

Ellen Nakashima and Ed O’Keefe 12:53 PM ET
The National Security Agency secretly collected phone records of millions of Verizon customers.

An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.

Dropbox , the cloud storage and synchronization service, is described as “coming soon.”

Government officials declined to comment for this article.

Roots in the ’70s

PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.

The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — address packets, device signatures and the like — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”

But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over “exponential growth” in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.
Image


-Vader

User avatar
Posts: 26395
Joined: February 2010
Location: Houston, Texas
I was literally listening to this song just as I opened this thread.


User avatar
Posts: 6778
Joined: February 2011
Location: The Discount Inn
Vader182 wrote:http://www.washingtonpost.com/investiga ... story.html

First page:
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who knew about PRISM were bound by oaths of office to hold their tongues.

Graphic

NSA slides explain the PRISM data-collection program
Related stories
‘No Such Agency’ spies on the communications of the world

Anne Gearan 4:35 PM ET
The National Security Agency, nicknamed such for years, is the U.S. government’s eavesdropper-in-chief.
Report: NSA asked Verizon for all U.S. call data

Ellen Nakashima 6:51 AM ET
If document requiring company to submit phone records for millions of Americans is authentic, it would be the broadest surveillance order known to date.
All about the NSA surveillance program.

Timothy B. Lee 2:46 PM ET
What has the government been doing? Is it legal? Does it mean some bureaucrat somewhere has heard all your phone calls? Read on to find out.
Administration, lawmakers defend NSA program to collect phone logs

Ellen Nakashima and Ed O’Keefe 12:53 PM ET
The National Security Agency secretly collected phone records of millions of Verizon customers.

An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.

Dropbox , the cloud storage and synchronization service, is described as “coming soon.”

Government officials declined to comment for this article.

Roots in the ’70s

PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.

The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — address packets, device signatures and the like — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”

But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over “exponential growth” in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.
Image


-Vader
Beautiful. Isn't it?
Image

User avatar
Posts: 17534
Joined: May 2011
Image

User avatar
Posts: 4056
Joined: January 2009
Location: Cupertino, CA
dafox wrote: Beautiful. Isn't it?
Image
Image

User avatar
Posts: 16015
Joined: June 2011
Location: New York City
Image

User avatar
Posts: 4056
Joined: January 2009
Location: Cupertino, CA
:?
Apple wrote:We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.

User avatar
Posts: 6087
Joined: June 2012
Location: Colorado
TeddyBlass wrote::?
Apple wrote:We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.
Of course that's what they'd say

User avatar
Posts: 22478
Joined: May 2010
Location: Castle
meh, I seen that movie already

Image

User avatar
Posts: 8266
Joined: October 2012
Location: Gran Pulse
When i read the title thread my mind instantly said Person of Interest, :lol:

Post Reply