FBI access to PRISM surveillance program expands

US Federal Bureau of Investigation (FBI) access to overseas surveillance collected by the National Security Agency (NSA) has expanded in recent years, with the law enforcement agency gaining access to collected, but unprocessed data, in 2009, according to a report released by the government.

The FBI's access to email and other data collected from overseas targets in the NSA's Prism program has been growing since 2008, according to a 2012 U.S. Department of Justice inspector general's report declassified last Friday by the DOJ. The agency made the highly redacted inspector general's report public in response to a Freedom of Information Act request by the New York Times.

In 2008, the FBI began reviewing email accounts targeted by the NSA through the Prism program, according to the report and a New York Times story.

Then, in October 2009, the FBI requested that information collected under the Prism program be "dual routed" to both the NSA and the FBI so that the FBI "could retain this data for analysis and dissemination in intelligence reports," according to the IG's report.

And in April 2012, the FBI began nominating email addresses and phone numbers that the NSA should target in it surveillance program, according to the document.

The IG's report, however, concluded that the FBI took a responsible approach toward the surveillance program. The FBI's Prism team "implemented its targeting procedures with commendable deliberation, thoroughness and professionalism," the report said.

The NSA's Prism program targets email messages and other digital communications by people outside the U.S. in an effort to deter terrorism. The NSA reportedly accessed the networks of Google, Yahoo, Apple and other Internet companies to gain access to users' communications, although some companies have insisted that they were not willing partners in the surveillance programs, as original leaks by former NSA contractor Edward Snowden suggested.
The Prism program isn't supposed to target U.S. communications, but some domestic communications are inadvertently collected, according to oversight reports.

Computerworld

 

« US Military Is Building Advanced Military Drones
Did the White House Use Drone Killing Technology? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.