Keep up with the news by installing RT’s extension for . Never miss a story with this clean and simple app that delivers the latest headlines to you.

 

Newly released NSA slides explain mechanics of US surveillance

Published time: June 30, 2013 03:39
Edited time: July 01, 2013 10:46
AFP Photo

AFP Photo

In the latest revelations of the NSA leaks scandal, new slides have emerged thoroughly explaining the targeting process of the US government top-secret PRISM program deployed to spy on communication data of targets operating abroad.

The screenshots published by the Washington Post, detail how PRISM tasks are issued by analysts and describes the approval process of an individual requests. To begin with, an NSA analyst "tasks" PRISM to gather information about a surveillance target.  The system then temporarily freezes that request and automatically ask for an approval from a supervisor.  If the superior decides that the request possesses a "reasonable belief" of perceived threat, then PRISM goes to work.

NSA slide published by the Washington Post

In the surveillance process, NSA often obtains its live data from the FBI that retrieves matching information, using government equipment from companies such as Google, Microsoft and Yahoo.

With the participation of those companies, PRISM – and therefore Washington intelligence workers – "incidentally" have access to the bulk of Americans’ email, video and voice chat, videos, photos, voice-over-IP (Skype) chats, file transfers and social networking details.

For stored data, the FBI deploys its own databases that review the selects request, before it is forwarded to the NSA.

NSA slide published by the Washington Post

The information is then analyzed and processed by a system that can interpret voice, text, video and "digital network information.”

The FBI interceptions from private firms are also being channeled to more "customers" at the NSA, CIA or FBI. Each target is then assigned a PRISM case notation which reflects the availability of real-time surveillance as well as stored data.

NSA slide published by the Washington Post

Depending on the access to private firm’s information, the NSA begins to monitor  live notifications of the target’s mobile logs. On the April 5 slide some 117,675 users were targeted in PRISM database.

NSA slide published by the Washington Post

Saturday’s revelations expand the slides that were revealed earlier in June, revealing the existence of the PRISM program, which mines data from the nine leading US Internet companies. Earlier information also revealed the world’s electronic communications flow and Washington’s control over providers.

The NSA venture does not require individual warrants. It is also court approved and is administered through federal judges who rule on the Foreign Intelligence Surveillance Act (FISA).



Comments (71)

Anonymous user 03.07.2013 10:25

Replicating the xionist way in the land of the free and hope.... Total fascism in the making

Anonymous user 02.07.2013 22:22

The Constitution guarantess privacy, not safety and security.

Anonymous user 02.07.2013 19:16

The Paranoid Bully gets caught, subjecting Americans to question their rights, shame on the USG

View all comments (71)
Add comment

Authorization required for adding comments

Register or

Name

Password

Show password

Register

or Register

Request a new password

Send

or Register

To complete a registration check
your Email:

OK

or Register

A password has been sent to your email address

Edit profile

X

Name

New password

Retype new password

Current password

Save

Cancel

Follow us

Follow us