Details NSA data acquisition under the PRISM program.
NSA, via Washington Post
This was a bad week for spies, and a great week to find out how we were spied on. Following revelations Wednesday that Verizon handed over millions of call records to the National Security Administration, news broke Thursday that the FBI and NSA had access (probably not direct) to servers for nine U.S. internet companies. The name of this program is PRISM, as a reference to splitting light on fiber-optic cables.
Authorization for this program dates back to an anti-terror surveillance bill passed by Congress in 2007. While aimed at finding communication between foreign terrorists, the language was broad and never restricted government surveillance of communications between people within the United States. Instead, the NSA uses a rough metric to make sure they are only listening to communications with 51 percent confidence in their “foreignness,” which sounds ridiculous because it is. The legislation was supposed to expire in six months, but many of its provisions were reauthorized by the Foreign Intelligence Surveillance Act of 2008.
The PRISM program grew from this authority. President as a rule regard themselves:
The White House then chooses how much of this information to filter down to Congress. Under the Constitution, the President has primary authority and responsibility for foreign affairs and national security. This primacy, combined with the vast array of intelligence collection agencies under the executive branch, create an institutional bias towards intelligence collection as a preventative measure against terror attacks. This is heightened by repeated coverage of the intelligence collection and communication gaps that failed to prevent the September 11th, 2001 attacks, creating a strong incentive for a sweeping data collection apparatus.
PRISM itself doesn’t generate new information. Instead, it perches atop the architecture of the internet like a gargoyle, and gathers everything that passes through. PRISM currently accesses data from nine companies: Micrsoft, Google, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. Microsoft joined first in 2007, with Apple becoming part of the program last, in 2012. While the law that authorized this program was set to expire in 2012, Congress passed a re-authorization extending it to 2017.
Information is pulled from the servers of these companies, again with the goal of finding communications between foreign terrorists and people within the United States. Rather than looking for direct linkages, however, it just hoovers up an obscene amount of information and assumes the connections will reveal themselves later in analysis.
On its own, the program is unlikely to catch a terrorist. Corey Chivers ran a Bayesian probability analysis of the program, and by his math:
That’s an insane false positive ratio for a program, which makes it very unlikely that the program is actually being used to find specific terrorists. Instead, my hunch is that this builds cases backwards, creating an available log of information for individuals that can be brought up as supporting evidence when hard evidence emerges.
When asked about PRISM at a Friday afternoon press conference, President Obama responded:
PRISM is a technically legal way for the government to bypass privacy in the interest of national security, but no part of how it operates fits in with the privacy people (albeit falsely) assume they have online. Congressional action, as well as more modern legal rulings on privacy, are what it would take to bring the law around to common usage.
Until then, expect programs like PRISM to remain a part of online life in America.
Powered by WPeMatico