Sunday 9 June 2013

NSA data-mining 101: two 'top secret' programs and what they do

Two US surveillance programs ? one scooping up records of Americans' phone calls and the other collecting information on Internet-based activities ? came to public attention this week. The aim: data-mining to help the NSA thwart terrorism. But not everyone is cool with it.

By Mark Clayton,?Staff writer / June 7, 2013

A sign stands outside the National Security Administration campus in Fort Meade, Md., June 6.

Patrick Semansky/AP/File

Enlarge

In the name of fighting terrorism, the US government has been mining data collected from phone companies such as Verizon for the past seven years and from Google, Facebook, and other social media firms for at least four years, according to government documents leaked this week to news organizations.

Skip to next paragraph

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; // google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

The two surveillance programs ? one that collects detailed records of telephone calls, the other that collects data on Internet-based activities such as e-mail, instant messaging, and video conferencing ? were publicly revealed in "top secret" documents leaked to the British newspaper the Guardian and the Washington Post. Both are run by the National Security Agency (NSA), the papers reported.?

The existence of the telephone data-mining program was previously known, and civil libertarians have for years complained that it represents a dangerous and overbroad incursion into the privacy of all Americans. What became clear this week were certain details about its operation ? such as that the government sweeps up data daily and that a special court has been renewing the program every 90 days since about 2007. But the reports about the Internet-based data-mining program, called PRISM, represent a new revelation, at least to the general public.?

Data-mining can involve the use of automated algorithms to sift through a database for clues as to the existence of a terrorist plot. One member of Congress claimed this week that the telephone data-mining program helped to thwart a significant terrorism incident in the United States "within the last few years," but could not offer more specifics because the whole program is classified. Others in Congress, as well as President Obama and the director of national intelligence, sought to allay concerns of critics that the surveillance programs represent Big Government run amok.

But it would be wrong to suggest that every member of Congress is on board with the sweep of such data mining programs or with the amount of oversight such national-security endeavors get from other branches of government. Some have hinted for years that they find such programs disturbing and an infringement of people's privacy. Here's an overview of these two data-mining programs, and how much oversight they are known to have.?

Phone-record data mining

On Thursday, the Guardian displayed on its website a top-secret court order authorizing the telephone data-collection program. The order, signed by a federal judge on the mysterious Foreign Intelligence Surveillance Court, requires?a subsidiary of Verizon to send to the NSA ?on an ongoing daily basis? through July its ?telephony metadata,? or communications logs, ?between the United States and abroad? or ?wholly within the United States, including local telephone calls.??

Such metadata include the phone number calling and the number called, telephone calling card numbers, and time and duration of calls.?What's not included is permission for the NSA to record or listen to a phone conversation. That would require a separate court order, federal officials said after the program's details were made public.

After the Guardian published the court's order, it became clear that the document merely renewed a data-collection that has been under way since 2007 ? and one that does not target Americans, federal officials said.

Source: http://rss.csmonitor.com/~r/feeds/csm/~3/jVHgRnYDKsA/NSA-data-mining-101-two-top-secret-programs-and-what-they-do

joseph kony ipad 3 release date apple store down apple live blog ohio primary cell phone jammer g8 summit

No comments:

Post a Comment