FBI access to PRISM surveillance program expands

US Federal Bureau of Investigation (FBI) access to overseas surveillance collected by the National Security Agency (NSA) has expanded in recent years, with the law enforcement agency gaining access to collected, but unprocessed data, in 2009, according to a report released by the government.

The FBI's access to email and other data collected from overseas targets in the NSA's Prism program has been growing since 2008, according to a 2012 U.S. Department of Justice inspector general's report declassified last Friday by the DOJ. The agency made the highly redacted inspector general's report public in response to a Freedom of Information Act request by the New York Times.

In 2008, the FBI began reviewing email accounts targeted by the NSA through the Prism program, according to the report and a New York Times story.

Then, in October 2009, the FBI requested that information collected under the Prism program be "dual routed" to both the NSA and the FBI so that the FBI "could retain this data for analysis and dissemination in intelligence reports," according to the IG's report.

And in April 2012, the FBI began nominating email addresses and phone numbers that the NSA should target in it surveillance program, according to the document.

The IG's report, however, concluded that the FBI took a responsible approach toward the surveillance program. The FBI's Prism team "implemented its targeting procedures with commendable deliberation, thoroughness and professionalism," the report said.

The NSA's Prism program targets email messages and other digital communications by people outside the U.S. in an effort to deter terrorism. The NSA reportedly accessed the networks of Google, Yahoo, Apple and other Internet companies to gain access to users' communications, although some companies have insisted that they were not willing partners in the surveillance programs, as original leaks by former NSA contractor Edward Snowden suggested.
The Prism program isn't supposed to target U.S. communications, but some domestic communications are inadvertently collected, according to oversight reports.

Computerworld

 

« US Military Is Building Advanced Military Drones
Did the White House Use Drone Killing Technology? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Issue53

Issue53

We empower organizations to thrive in the digital landscape. Strengthen your defenses, enhance resilience – Choose Issue53 for a secure and future-ready IT environment.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).