PRISM: What鈥檚 behind this NSA surveillance tool lurking about your Facebook page?
The PRISM program has been sucking up what most people would think of as personal information on Google, Facebook, Skype, and other Internet providers. What鈥檚 up with the NSA's secret surveillance effort?
The PRISM program has been sucking up what most people would think of as personal information on Google, Facebook, Skype, and other Internet providers. What鈥檚 up with the NSA's secret surveillance effort?
PRISM. Its code name sounds like something out of a James Bond novel. Cold, hard-edged, geometric and geological, spelled all-caps but not an acronym 鈥 at least not one intelligence officials reveal publicly.
It鈥檚 the super-secret program to surreptitiously sweep the Internet for audio, video, photographs, emails and web searches from nine major US Internet providers 鈥 Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple 鈥 in hopes of detecting suspicious behavior that begins overseas and may be tied to terrorism.
鈥淪uper-secret,鈥 that is, until this past week, when the Washington Post and Britain鈥檚 Guardian newspaper pulled back the curtain on this massive surveillance effort spawned in the wake of the 911 terrorist attacks.
So what do we know now about PRISM? Here鈥檚 how the Washington Post reports its genesis:
鈥淧RISM was launched from the ashes of President George W. Bush鈥檚 secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority,鈥 the Post reported Thursday. 鈥淐ongress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with US intelligence collection.鈥
Meanwhile, the story continues to unfold.
The Guardian on Saturday published another slide from the 41-slide National Security Agency (NSA) PowerPoint presentation which details PRISM and its operation.聽
鈥淭he slide details different methods of data collection under the FISA Amendment Act of 2008 (which was renewed in December 2012),鈥 the Guardian reports. 鈥淚t clearly distinguishes PRISM, which involves data collection from servers, as distinct from four different programs involving data collection from 鈥榝iber cables and infrastructure as data flows past.鈥欌
鈥淓ssentially, the slide suggests that the NSA also collects some information 鈥 from cable intercepts, but that process is distinct from PRISM,鈥 according to this report. In other words, PRISM isn鈥檛 the only tool sucking up what most people would think of as personal information.
Ideally, PRISM was designed to help keep Americans safe. Does that mean the secret program鈥檚 exposure could have the opposite result?
In his remarks on the revelations Friday, President Obama echoed intelligence experts 鈥 both inside and outside the government 鈥 who predicted that potential attackers will find other, secretive ways to communicate now that they know that their phone and Internet records may be targeted.
An al-Qaida affiliated website on Saturday warned against using the Internet to discuss issues related to militant activities in three long articles on what it called "America's greatest and unprecedented scandal of spying on its own citizens and people in other countries,鈥 reports the Associated Press.
"Caution: Oh brothers, it is a great danger revealing聽PRISM, the greatest American spying project," wrote one member. "A highly important caution for the Internet jihadis ... American intelligence gets information from Facebook and Google," wrote another.
Meanwhile, questions are being raised about the initial reporting on NSA surveillance of personal data.
CNET, the tech media website, headlines a long piece Friday 鈥淣o evidence of NSA's 'direct access' to tech companies.鈥 CNET quotes its own anonymous intelligence insiders, and it notes some backtracking on the original stories.
We haven鈥檛 heard the end of PRISM, which CNET chief political correspondent Declan McCullagh says is simply an unclassified data processing tool used for other intelligence purposes as well and standing for 鈥淧lanning Tool for Resource Integration, Synchronization, and Management.鈥
Not much James Bondian about that 鈥 or maybe there is.
As the Guardian reported Saturday, 鈥淎 far fuller picture of the exact operation of PRISM, and the other surveillance operations brought to light, is expected to emerge in the coming weeks and months.鈥
One more mystery to be solved: Why was Twitter not included in the nine Internet providers listed above?
USA Today鈥檚 Scott Martin speculates on two explanations for Twitter's absence.
鈥淭witter has a history of noncompliance and fighting information requests against its users,鈥 he writes.
"As we've said many times before, Twitter users own their Tweets,鈥 Twitter spokesman Jim Prosser is quoted as saying. 鈥淭hey have a right to fight invalid government requests, and we stand with them in that fight.鈥
鈥淎nother explanation for Twitter's absence is that the bulk of its data 鈥 aside from direct messages 鈥 is publicly available in the form of tweets,鈥 Martin writes. 鈥淭hat separates it from the likes of Yahoo and Google, which house years of personal emails and data on people.鈥