SlideShare a Scribd company logo
1 of 5
President Barack Obama gestures
during a statment about the Affordable
Care Act, Friday, June 7, 2013, in San
Jose, Calif. Speaking about the NSA
collecting of phone records, the
president said`Nobody is listening to
your telephone calls,' just numbers
and duration
WASHINGTON (AP) — Eager to quell a domestic furor over U.S. spying, the nation’s top
intelligence official stressed Saturday that a previously undisclosed program for tapping into
Internet usage is authorized by Congress, falls under strict supervision of a secret court and
cannot intentionally target a U.S. citizen. He decried the revelation of that and another
intelligence-gathering program as reckless.
For the second time in three days, Director of National Intelligence James Clapper took the
rare step of declassifying some details of an intelligence program to respond to media
reports about counterterrorism techniques employed by the government.
Disclosing information about the specific methods the government uses to collect
communications can obviously give our enemies a ‘playbook’ of how to avoid detection,’’ he
said in a statement.
Clapper said the data collection under the program, first unveiled by the newspapers The
Washington Post and The Guardian, was with the approval of the secret Foreign Intelligence
Surveillance Act Court and with the knowledge of Internet service providers. He emphasized
that the government does not act unilaterally to obtain that data from the servers of those
providers.
The National Security Agency filed a criminal report with the Justice Department earlier this week in relation to the
leaks, Shawn Turner, a spokesman for the Office of the Director of National Intelligence, said in an email
Saturday to The Associated Press.
President Barack Obama defended the counterterrorism methods on Friday and said Americans need to ‘‘make
some choices’’ in balancing privacy and security. But the president’s response and Clapper’s unusual public
stance underscore the nerve touched by the disclosures and the sensitivity of the Obama administration to any
suggestion that it is trampling on the civil liberties of Americans.
Late Thursday, Clapper declassified some details of a phone records collection program employed by the NSA
that aims to obtain from phone companies on an ‘‘ongoing, daily basis’’ the records of its customers’ calls.
Clapper said that under that court-supervised program, only a small fraction of the records collected ever get
examined because most are unrelated to any inquiries into terrorism activities.
His statement and declassification Saturday addressed the Internet scouring program, code-named PRISM, that
allowed the NSA and FBI to tap directly into the servers of major U.S. Internet companies such as Google, Apple,
Microsoft, Facebook and AOL. Like the phone-records program, PRISM was approved by a judge in a secret
court order. Unlike that program, however, PRISM allowed the government to seize actual conversations: emails,
video chats, instant messages and more.
Clapper said the program, authorized in the USA Patriot Act, has been in place since 2008, the last year of the
George W. Bush administration, and ‘‘has proven vital to keeping the nation and our allies safe.
‘‘It continues to be one of our most important tools for the protection of the nation’s security,’’ he said.
Among the previously classified information about the Internet data collection that Clapper revealed:
—It is an internal government computer system that allows the government to collect foreign intelligence
information from electronic communication service providers under court supervision.
—The government does not unilaterally obtain information from the servers of U.S. electronic communication
service providers. It requires approval from a FISA Court judge and is conducted with the knowledge of
the provider and service providers supply information when they are legally required to do so.
—The program seeks foreign intelligence information concerning foreign targets located outside the United
States.
—The government cannot target anyone under the program unless there is an ‘‘appropriate, and
documented, foreign intelligence purpose’’ for the acquisition. Those purposes include prevention of
terrorism, hostile cyber activities or nuclear proliferation. The foreign target must be reasonably believed
to be outside the United States. It cannot intentionally target any U.S. citizen or any person known to be
in the U.S.
—The dissemination of information ‘‘incidentally intercepted’’ about a U.S. person is prohibited unless it is
‘‘necessary to understand foreign intelligence or assess its importance, is evidence of a crime, or
indicates a threat of death or serious bodily harm.
The Post and the Guardian cited confidential slides and other documents about PRISM for their reports. They
named Google, Facebook, Microsoft Corp., Apple Inc., Yahoo Inc., AOL Inc. and Paltalk as companies
whose data has been obtained.

More Related Content

What's hot

Dea has more extensive domestic phone surveillance op than nsa
Dea has more extensive domestic phone surveillance op than nsaDea has more extensive domestic phone surveillance op than nsa
Dea has more extensive domestic phone surveillance op than nsaWorld Truth
 
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph MennHunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph MennShakacon
 
The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionSteven Brownstein
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeChristian Watson
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 
With a license to kill with drones
With a license to kill with dronesWith a license to kill with drones
With a license to kill with dronesKnut Harald Nylænde
 
Исковое заявление против ФБР
Исковое заявление против ФБРИсковое заявление против ФБР
Исковое заявление против ФБРAnatol Alizar
 
Are Americans worried about the NSA?
Are Americans worried about the NSA? Are Americans worried about the NSA?
Are Americans worried about the NSA? AEI
 
Randall siwiec Harvard university (group) paper for congressional intelligenc...
Randall siwiec Harvard university (group) paper for congressional intelligenc...Randall siwiec Harvard university (group) paper for congressional intelligenc...
Randall siwiec Harvard university (group) paper for congressional intelligenc...Randy Siwiec
 
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...Randy Siwiec
 
Launch, license, let a solution to end police violence
Launch, license, let   a solution to end police violenceLaunch, license, let   a solution to end police violence
Launch, license, let a solution to end police violenceVictor Holman
 
Cop critic a solution to police violence against unarmed men
Cop critic   a solution to police violence against unarmed menCop critic   a solution to police violence against unarmed men
Cop critic a solution to police violence against unarmed menVictor Holman
 
Cop critic bringing transparency to law enforcement
Cop critic   bringing transparency to law enforcementCop critic   bringing transparency to law enforcement
Cop critic bringing transparency to law enforcementVictor Holman
 

What's hot (20)

How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
 
Dea has more extensive domestic phone surveillance op than nsa
Dea has more extensive domestic phone surveillance op than nsaDea has more extensive domestic phone surveillance op than nsa
Dea has more extensive domestic phone surveillance op than nsa
 
Hunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph MennHunting Government Back Doors by Joseph Menn
Hunting Government Back Doors by Joseph Menn
 
The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on Crime
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Survey_Lab_Poll_Analysis
Survey_Lab_Poll_AnalysisSurvey_Lab_Poll_Analysis
Survey_Lab_Poll_Analysis
 
Guns Real
Guns RealGuns Real
Guns Real
 
Our digital traces and how they can be missuseed
Our digital traces and how they can be missuseedOur digital traces and how they can be missuseed
Our digital traces and how they can be missuseed
 
Crime
CrimeCrime
Crime
 
With a license to kill with drones
With a license to kill with dronesWith a license to kill with drones
With a license to kill with drones
 
Исковое заявление против ФБР
Исковое заявление против ФБРИсковое заявление против ФБР
Исковое заявление против ФБР
 
Are Americans worried about the NSA?
Are Americans worried about the NSA? Are Americans worried about the NSA?
Are Americans worried about the NSA?
 
Randall siwiec Harvard university (group) paper for congressional intelligenc...
Randall siwiec Harvard university (group) paper for congressional intelligenc...Randall siwiec Harvard university (group) paper for congressional intelligenc...
Randall siwiec Harvard university (group) paper for congressional intelligenc...
 
National Post Humber News
National Post Humber NewsNational Post Humber News
National Post Humber News
 
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
Randall Siwiec Harvard University Govt - 40 Russia interference of the U.S. 2...
 
Launch, license, let a solution to end police violence
Launch, license, let   a solution to end police violenceLaunch, license, let   a solution to end police violence
Launch, license, let a solution to end police violence
 
Cop critic a solution to police violence against unarmed men
Cop critic   a solution to police violence against unarmed menCop critic   a solution to police violence against unarmed men
Cop critic a solution to police violence against unarmed men
 
Cop critic bringing transparency to law enforcement
Cop critic   bringing transparency to law enforcementCop critic   bringing transparency to law enforcement
Cop critic bringing transparency to law enforcement
 

Viewers also liked

Viewers also liked (15)

โครงงานคอมพิวเตอร์ใบงานที่ 9 16
โครงงานคอมพิวเตอร์ใบงานที่ 9 16โครงงานคอมพิวเตอร์ใบงานที่ 9 16
โครงงานคอมพิวเตอร์ใบงานที่ 9 16
 
06 art50
06 art5006 art50
06 art50
 
O-net ปี 53
O-net ปี 53O-net ปี 53
O-net ปี 53
 
7เคมี
7เคมี7เคมี
7เคมี
 
ไทย
ไทยไทย
ไทย
 
7 phy1
7 phy17 phy1
7 phy1
 
7 eng1
7 eng17 eng1
7 eng1
 
O-net54
O-net54O-net54
O-net54
 
10th grade english citr summer-reading (4)
10th grade english citr summer-reading (4)10th grade english citr summer-reading (4)
10th grade english citr summer-reading (4)
 
ข้อสอบO-netปี52
ข้อสอบO-netปี52ข้อสอบO-netปี52
ข้อสอบO-netปี52
 
7 thai1
7 thai17 thai1
7 thai1
 
โครงงานเทคโนโลยีปุ๋ยคอกรึปุ๋ยเคมีที่พืชเติบโตดีกว่ากัน
โครงงานเทคโนโลยีปุ๋ยคอกรึปุ๋ยเคมีที่พืชเติบโตดีกว่ากันโครงงานเทคโนโลยีปุ๋ยคอกรึปุ๋ยเคมีที่พืชเติบโตดีกว่ากัน
โครงงานเทคโนโลยีปุ๋ยคอกรึปุ๋ยเคมีที่พืชเติบโตดีกว่ากัน
 
โครงงานเทคโนโลยี ปุ๋ยคอกปุ๋ยเคมี
โครงงานเทคโนโลยี ปุ๋ยคอกปุ๋ยเคมี โครงงานเทคโนโลยี ปุ๋ยคอกปุ๋ยเคมี
โครงงานเทคโนโลยี ปุ๋ยคอกปุ๋ยเคมี
 
Document 1820130813093402
Document 1820130813093402Document 1820130813093402
Document 1820130813093402
 
ตัวอย่างโครงงาน
ตัวอย่างโครงงานตัวอย่างโครงงาน
ตัวอย่างโครงงาน
 

Similar to Intelligence chief defends internet spying program

Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collectiontrupassion
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
Drug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates AmericansDrug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates Americans3carportspta
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security AgencyToya Shamberger
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping ScandalArun Prasaath
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxelishaoatway
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
germany chancellor
germany chancellorgermany chancellor
germany chancellorAli J
 

Similar to Intelligence chief defends internet spying program (17)

Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Prism
PrismPrism
Prism
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Drug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates AmericansDrug Enforcement Agency Secretly Investigates Americans
Drug Enforcement Agency Secretly Investigates Americans
 
Academic project used marketing data to monitor russian military sites
Academic project used marketing data  to monitor russian military sites Academic project used marketing data  to monitor russian military sites
Academic project used marketing data to monitor russian military sites
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
germany chancellor
germany chancellorgermany chancellor
germany chancellor
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 

Recently uploaded

Textile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-IndiaTextile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-Indiatheunitedindian7
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfssuser5750e1
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdftaxguruedu
 
12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsVoterMood
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...IT Industry
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Recently uploaded (8)

Textile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-IndiaTextile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-India
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdf
 
12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 

Intelligence chief defends internet spying program

  • 1.
  • 2. President Barack Obama gestures during a statment about the Affordable Care Act, Friday, June 7, 2013, in San Jose, Calif. Speaking about the NSA collecting of phone records, the president said`Nobody is listening to your telephone calls,' just numbers and duration
  • 3. WASHINGTON (AP) — Eager to quell a domestic furor over U.S. spying, the nation’s top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen. He decried the revelation of that and another intelligence-gathering program as reckless. For the second time in three days, Director of National Intelligence James Clapper took the rare step of declassifying some details of an intelligence program to respond to media reports about counterterrorism techniques employed by the government. Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection,’’ he said in a statement. Clapper said the data collection under the program, first unveiled by the newspapers The Washington Post and The Guardian, was with the approval of the secret Foreign Intelligence Surveillance Act Court and with the knowledge of Internet service providers. He emphasized that the government does not act unilaterally to obtain that data from the servers of those providers.
  • 4. The National Security Agency filed a criminal report with the Justice Department earlier this week in relation to the leaks, Shawn Turner, a spokesman for the Office of the Director of National Intelligence, said in an email Saturday to The Associated Press. President Barack Obama defended the counterterrorism methods on Friday and said Americans need to ‘‘make some choices’’ in balancing privacy and security. But the president’s response and Clapper’s unusual public stance underscore the nerve touched by the disclosures and the sensitivity of the Obama administration to any suggestion that it is trampling on the civil liberties of Americans. Late Thursday, Clapper declassified some details of a phone records collection program employed by the NSA that aims to obtain from phone companies on an ‘‘ongoing, daily basis’’ the records of its customers’ calls. Clapper said that under that court-supervised program, only a small fraction of the records collected ever get examined because most are unrelated to any inquiries into terrorism activities. His statement and declassification Saturday addressed the Internet scouring program, code-named PRISM, that allowed the NSA and FBI to tap directly into the servers of major U.S. Internet companies such as Google, Apple, Microsoft, Facebook and AOL. Like the phone-records program, PRISM was approved by a judge in a secret court order. Unlike that program, however, PRISM allowed the government to seize actual conversations: emails, video chats, instant messages and more. Clapper said the program, authorized in the USA Patriot Act, has been in place since 2008, the last year of the George W. Bush administration, and ‘‘has proven vital to keeping the nation and our allies safe.
  • 5. ‘‘It continues to be one of our most important tools for the protection of the nation’s security,’’ he said. Among the previously classified information about the Internet data collection that Clapper revealed: —It is an internal government computer system that allows the government to collect foreign intelligence information from electronic communication service providers under court supervision. —The government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. It requires approval from a FISA Court judge and is conducted with the knowledge of the provider and service providers supply information when they are legally required to do so. —The program seeks foreign intelligence information concerning foreign targets located outside the United States. —The government cannot target anyone under the program unless there is an ‘‘appropriate, and documented, foreign intelligence purpose’’ for the acquisition. Those purposes include prevention of terrorism, hostile cyber activities or nuclear proliferation. The foreign target must be reasonably believed to be outside the United States. It cannot intentionally target any U.S. citizen or any person known to be in the U.S. —The dissemination of information ‘‘incidentally intercepted’’ about a U.S. person is prohibited unless it is ‘‘necessary to understand foreign intelligence or assess its importance, is evidence of a crime, or indicates a threat of death or serious bodily harm. The Post and the Guardian cited confidential slides and other documents about PRISM for their reports. They named Google, Facebook, Microsoft Corp., Apple Inc., Yahoo Inc., AOL Inc. and Paltalk as companies whose data has been obtained.