Reports: NSA, FBI collecting content from Google, Facebook, other services
Major Internet companies let US agencies probe their servers, the Washington Post and the Guardian eported
IDG News Service - The U.S. National Security Agency and Federal Bureau of Investigation have access to servers at Google, Facebook and other major Internet services, collecting audio, video, email and other content for surveillance, the Washington Post and the Guardian reported on Thursday.
The surveillance is taking place in real time under a classified program called PRISM, which was begun in 2007 to investigate foreign threats to the U.S., the reports said. Most of the major Internet services, including Microsoft, Yahoo, Skype, Apple and AOL as well as Google and Facebook, knowingly participate in PRISM, according to the Post and the Guardian.
"The program facilitates extensive, in-depth surveillance on live communications and stored information," the Guardian reported. The document obtained by the newspapers refers to "strong growth" in the program in recent years, with a specific reference to "exponential" growth in its use on Skype servers, for instance.
The Post report came from a leak by an intelligence officer, who supplied the newspaper with PowerPoint slides about PRISM, the story said. Both newspapers posted some of those slides with their articles. The document is recent, with a date of April 2013.
The story came out just a day after the Guardian newspaper in the U.K. reported that the NSA had been granted broad access to the call records of Verizon Communications customers, also for surveillance purposes.
The NSA is forbidden to investigate U.S. citizens. The PRISM program has procedures to prevent citizens' content from being included in the surveillance, but those procedures aren't strict, according to the reports. The agencies don't try to collect all the content from the Internet services, but PRISM allows agents to search for content and pull it out of the servers, the newspapers said.
Reached late Thursday, an NSA spokeswoman declined to comment, referring questions to the Office of the Director of National Intelligence.
Criticism from civil-liberties activists was swift and scathing.
"This is a completely unwarranted violation of our constitutional rights," John Simpson, a consumer advocate at the group Consumer Watchdog, said via email. "There is no justification for government snooping of this magnitude. The nine companies who acquiesced to this unconstitutional abuse by the government should be ashamed of themselves."
The American Civil Liberties Union called the PRISM allegations and the Verizon news alarming and called for Congressional action.
"The stories published over the last two days make clear that the NSA -- part of the military -- now has direct access to every corner of Americans' digital lives. Unchecked government surveillance presents a grave threat to democratic freedoms," said Jameel Jaffer, the ACLU's deputy legal director, in a written statement.
"The secrecy surrounding the government's extraordinary surveillance powers has stymied our system of checks and balances," wrote Laura Murphy, director of the ACLU Washington Legislative Office. "Congress must initiate an investigation to fully uncover the scope of these powers and their constraints, and it must enact reforms that protect Americans' right to privacy and that enable effective public oversight of our government."
Some Internet companies that allegedly participate in PRISM denied involvement.
Facebook called the allegations inaccurate. "We do not provide any government organization with direct access to Facebook servers," the company said in a statement attributed to Chief Security Officer Joe Sullivan. "When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law."
"Yahoo! takes users' privacy very seriously. We do not provide the government with direct access to our servers, systems, or network," a Yahoo spokeswoman said.
Google also said it reviews all user data requests carefully.
"From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a 'back door' for the government to access private user data," the company said in a statement.A
Apple also denied involvement, saying it had never heard of PRISM, according to news reports.
(Grant Gross in Washington and Zach Miners in San Francisco contributed to this report)
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Gartner Magic Quadrant for Client Management Tools
- The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution
- In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility
- Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Gartner Magic Quadrant for Application Security
- The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts