Saturday, June 29, 2013


Newly released NSA slides explain mechanics of U.S.surveillance

In the latest revelations of the NSA leaks scandal,new slides have emerged thoroughly explaining the targeting process of the U.S. government top-secret PRISM program deployed to spy on communication data of targets operating abroad.

In the surveillance process, NSA often obtains its live data from the FBI that retrieves matching information, using government equipment from companies such as Google, Microsoft and Yahoo. 

The screenshots published by the Washington Post, detail how PRISM tasks are issued by analysts and describes the approval process of an individual requests. To begin with, an NSA analyst "tasks" PRISM to gather information about a surveillance target.

The system then temporarily freezes that request and automatically ask for an approval from a supervisor.

If the superior decides that the request possesses a "reasonable belief" of perceived threat, then PRISM goes to work.

In the surveillance process, NSA often obtains its live data from the FBI that retrieves matching information, using government equipment from companies such as Google, Microsoft and Yahoo. 

 With the participation of those companies, PRISM – and therefore Washington intelligence workers – "incidentally" have access to the bulk of Americans’ email, video and voice chat, videos, photos, voice-over-IP (Skype) chats, file transfers and social networking details. 

For stored data, the FBI deploys its own databases that review the selects request, before it is forwarded to the NSA. 

The information is then analyzed and processed by a system that can interpret voice, text, video and "digital network information.”
The FBI interceptions from private firms are also being channeled to more "customers" at the NSA, CIA or FBI. Each target is then assigned a PRISM case notation which reflects the availability of real-time surveillance as well as stored data.

Depending on the access to private firm’s information, the NSA begins to monitor  live notifications of the target’s mobile logs. On the April 5 slide some 117,675 users were targeted in PRISM database.

Saturday’s revelations expand the slides that were revealed earlier in June, revealing the existence of the PRISM program, which mines data from the nine leading US Internet companies.
Earlier information also revealed the world’s electronic communications flow and Washington’s control over providers.
The NSA venture does not require individual warrants. It is also court approved and is administered through federal judges who rule on the Foreign Intelligence Surveillance Act (FISA). source

Tags : , , , , , , ,



The idea behind the text.
Respect for the truth is almost the basis of all morality.
Nothing can come from nothing.

Popular Topics


Well, the way they make shows is, they make one show. That show's called a pilot. Then they show that show to the people who make shows, and on the strength of that one show they decide if they're going to make more shows.

Like you, I used to think the world was this great place where everybody lived by the same standards I did, then some kid with a nail showed me I was living in his world, a world where chaos rules not order, a world where righteousness is not rewarded. That's Cesar's world, and if you're not willing to play by his rules, then you're gonna have to pay the price.

You think water moves fast? You should see ice. It moves like it has a mind. Like it knows it killed the world once and got a taste for murder. After the avalanche, it took us a week to climb out. Now, I don't know exactly when we turned on each other, but I know that seven of us survived the slide... and only five made it out. Now we took an oath, that I'm breaking now. We said we'd say it was the snow that killed the other two, but it wasn't. Nature is lethal but it doesn't hold a candle to man.

You see? It's curious. Ted did figure it out - time travel. And when we get back, we gonna tell everyone. How it's possible, how it's done, what the dangers are. But then why fifty years in the future when the spacecraft encounters a black hole does the computer call it an 'unknown entry event'? Why don't they know? If they don't know, that means we never told anyone. And if we never told anyone it means we never made it back. Hence we die down here. Just as a matter of deductive logic.