In the latest revelations of the NSA leaks scandal, new slides have emerged thoroughly explaining the targeting process of the US government top-secret PRISM program deployed to spy on communication data of targets operating abroad.
The screenshots published by the Washington Post, detail how PRISM tasks are issued by analysts and describes the approval process of an individual requests. To begin with, an NSA analyst “tasks” PRISM to gather information about a surveillance target. The system then temporarily freezes that request and automatically ask for an approval from a supervisor. If the superior decides that the request possesses a “reasonable belief” of perceived threat, then PRISM goes to work.
In the surveillance process, NSA often obtains its live data from the FBI that retrieves matching information, using government equipment from companies such as Google, Microsoft and Yahoo.
SOURCE: rt.com
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
Recent Comments
Chat systems such as Slack and Teams need to be…
“This is a sophisticated phishing scam that will catch out…
“Cybersecurity is increasingly complex, in part, due to the interconnected…
“Unfortunately, time and time again we see NGOs, hospitals and…
As I have always said - it is verified trust…