Reports: NSA, FBI collecting content from Google, Facebook, other services
Major Internet companies let US agencies probe their servers, the Washington Post and the Guardian eported
IDG News Service - The U.S. National Security Agency and Federal Bureau of Investigation have access to servers at Google, Facebook and other major Internet services, collecting audio, video, email and other content for surveillance, the Washington Post and the Guardian reported on Thursday.
The surveillance is taking place in real time under a classified program called PRISM, which was begun in 2007 to investigate foreign threats to the U.S., the reports said. Most of the major Internet services, including Microsoft, Yahoo, Skype, Apple and AOL as well as Google and Facebook, knowingly participate in PRISM, according to the Post and the Guardian.
"The program facilitates extensive, in-depth surveillance on live communications and stored information," the Guardian reported. The document obtained by the newspapers refers to "strong growth" in the program in recent years, with a specific reference to "exponential" growth in its use on Skype servers, for instance.
The Post report came from a leak by an intelligence officer, who supplied the newspaper with PowerPoint slides about PRISM, the story said. Both newspapers posted some of those slides with their articles. The document is recent, with a date of April 2013.
The story came out just a day after the Guardian newspaper in the U.K. reported that the NSA had been granted broad access to the call records of Verizon Communications customers, also for surveillance purposes.
The NSA is forbidden to investigate U.S. citizens. The PRISM program has procedures to prevent citizens' content from being included in the surveillance, but those procedures aren't strict, according to the reports. The agencies don't try to collect all the content from the Internet services, but PRISM allows agents to search for content and pull it out of the servers, the newspapers said.
Reached late Thursday, an NSA spokeswoman declined to comment, referring questions to the Office of the Director of National Intelligence.
Criticism from civil-liberties activists was swift and scathing.
"This is a completely unwarranted violation of our constitutional rights," John Simpson, a consumer advocate at the group Consumer Watchdog, said via email. "There is no justification for government snooping of this magnitude. The nine companies who acquiesced to this unconstitutional abuse by the government should be ashamed of themselves."
The American Civil Liberties Union called the PRISM allegations and the Verizon news alarming and called for Congressional action.
"The stories published over the last two days make clear that the NSA -- part of the military -- now has direct access to every corner of Americans' digital lives. Unchecked government surveillance presents a grave threat to democratic freedoms," said Jameel Jaffer, the ACLU's deputy legal director, in a written statement.
"The secrecy surrounding the government's extraordinary surveillance powers has stymied our system of checks and balances," wrote Laura Murphy, director of the ACLU Washington Legislative Office. "Congress must initiate an investigation to fully uncover the scope of these powers and their constraints, and it must enact reforms that protect Americans' right to privacy and that enable effective public oversight of our government."
Some Internet companies that allegedly participate in PRISM denied involvement.
Facebook called the allegations inaccurate. "We do not provide any government organization with direct access to Facebook servers," the company said in a statement attributed to Chief Security Officer Joe Sullivan. "When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law."
"Yahoo! takes users' privacy very seriously. We do not provide the government with direct access to our servers, systems, or network," a Yahoo spokeswoman said.
Google also said it reviews all user data requests carefully.
"From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a 'back door' for the government to access private user data," the company said in a statement.A
Apple also denied involvement, saying it had never heard of PRISM, according to news reports.
(Grant Gross in Washington and Zach Miners in San Francisco contributed to this report)
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.