Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Report: NSA, FBI collecting content from Google, Facebook, other services

Major Internet companies let U.S. agencies probe their servers, the Washington Post reported

The U.S. National Security Agency and Federal Bureau of Investigation have access to servers at Google, Facebook and other major Internet services, collecting audio, video, e-mail and other content for surveillance, the Washington Post reported on Thursday.

The surveillance is taking place under a classified program called PRISM, which was begun in 2007 to investigate foreign threats to the U.S., the report said. Most of the major Internet services, including Microsoft, Yahoo, Skype, Apple and AOL as well as Google and Facebook, knowingly participate in PRISM, according to the Post.

The report came from a leak by an intelligence officer, who supplied the Post with PowerPoint slides about PRISM, the story said. The newspaper posted those slides with its article.

The story came out just a day after the Guardian newspaper in the U.K. reported that the NSA had been granted broad access to the call records of Verizon Communications customers, also for surveillance purposes.

The NSA is forbidden to investigate U.S. citizens. The PRISM program has procedures to prevent citizens' content from being included in the surveillance, but those procedures aren't strict, according to the report. The agencies don't try to collect all the content from the Internet services, but PRISM allows agents to search for content and pull it out of the servers, the Post said.

Stephen Lawson covers mobile, storage and networking technologies for The IDG News Service. Follow Stephen on Twitter at @sdlawsonmedia. Stephen's e-mail address is stephen_lawson@idg.com

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: AOL, Apple, Facebook, Federal Bureau of Investigation, Google, IDG, Lawson, Microsoft, National Security Agency, NSA, Skype, Verizon, Verizon, Yahoo
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Government use of IT, National Security Agency, security, Federal Bureau of Investigation, internet, government, privacy
Latest Blog Posts
Whitepapers
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • Secure by design - How to dramatically simplify data protection, access control and other critical security tasks
    This white paper examines how you can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
    Learn more »
  • Migrating from BlackBerry? See Our Trusted Method.
    Are your business leaders demanding a migration plan from BlackBerry? Let the mobile experts at Good help you migrate without migraines. Our Professional Services team has deep experience supporting Fortune 500 organizations through the transition; read this sample planning chart and see our trusted method.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments