Report: NSA, FBI collecting content from Google, Facebook, other services
- 06 June, 2013 23:36
The U.S. National Security Agency and Federal Bureau of Investigation have access to servers at Google, Facebook and other major Internet services, collecting audio, video, e-mail and other content for surveillance, the Washington Post reported on Thursday.
The surveillance is taking place under a classified program called PRISM, which was begun in 2007 to investigate foreign threats to the U.S., the report said. Most of the major Internet services, including Microsoft, Yahoo, Skype, Apple and AOL as well as Google and Facebook, knowingly participate in PRISM, according to the Post.
The report came from a leak by an intelligence officer, who supplied the Post with PowerPoint slides about PRISM, the story said. The newspaper posted those slides with its article.
The story came out just a day after the Guardian newspaper in the U.K. reported that the NSA had been granted broad access to the call records of Verizon Communications customers, also for surveillance purposes.
The NSA is forbidden to investigate U.S. citizens. The PRISM program has procedures to prevent citizens' content from being included in the surveillance, but those procedures aren't strict, according to the report. The agencies don't try to collect all the content from the Internet services, but PRISM allows agents to search for content and pull it out of the servers, the Post said.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
The enlightened CIO’s guide to running projects
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
Virtual Server Backup Software Buyer’s Guide
Virtualization affords organizations multiple opportunities to reduce power, optimize hardware utilization, improve application availability and ultimately drive down costs. In light of its benefits, it is no surprise that virtualization penetration has surpassed 50% of all server workloads and continues to grow. In this guide, we evaluate prominent virtual server backup software solutions and identify their strengths and weaknesses.
Challenges & Opportunities for Government Data Management in Australia
From almost every angle, the message for Australian government bodies is as clear as it is for their private sector counterparts: do more with less. Effective data management policies are often the best ‘unrealised’ opportunities to directly address these high-level challenges, especially when it comes to government data custodianship.
Best Practices to Make BYOD Simple and Secure
As consumerisation continues to transform IT, organisations are moving quickly to design strategies to allow BYOD in the workplace. This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerisation - at the same time addressing requirements for security, simplicity and cost reduction. Find out how device ownership eases IT burdens in endpoint procurement and management. Click to download!