SlideShare a Scribd company logo
1
DIRECTOR OF NATIONAL INTELLIGENCE
WASHINGTON, DC 20511
June 8, 2013
Facts on the Collection of Intelligence Pursuant to Section 702
of the Foreign Intelligence Surveillance Act
 PRISM is not an undisclosed collection or data mining program. It is an internal government
computer system used to facilitate the government’s statutorily authorized collection of
foreign intelligence information from electronic communication service providers under
court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act
(FISA) (50 U.S.C. § 1881a). This authority was created by the Congress and has been widely
known and publicly discussed since its inception in 2008.
 Under Section 702 of FISA, the United States Government does not unilaterally obtain
information from the servers of U.S. electronic communication service providers. All such
information is obtained with FISA Court approval and with the knowledge of the provider
based upon a written directive from the Attorney General and the Director of National
Intelligence. In short, Section 702 facilitates the targeted acquisition of foreign intelligence
information concerning foreign targets located outside the United States under court
oversight. Service providers supply information to the Government when they are lawfully
required to do so.
 The Government cannot target anyone under the court-approved procedures for Section 702
collection unless there is an appropriate, and documented, foreign intelligence purpose for the
acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear
proliferation) and the foreign target is reasonably believed to be outside the United States.
We cannot target even foreign persons overseas without a valid foreign intelligence purpose.
 In addition, Section 702 cannot be used to intentionally target any U.S. citizen, or any other
U.S. person, or to intentionally target any person known to be in the United States. Likewise,
Section 702 cannot be used to target a person outside the United States if the purpose is to
acquire information from a person inside the United States.
 Finally, the notion that Section 702 activities are not subject to internal and external oversight
is similarly incorrect. Collection of intelligence information under Section 702 is subject to
an extensive oversight regime, incorporating reviews by the Executive, Legislative and
Judicial branches.
2
 The Courts. All FISA collection, including collection under Section 702, is overseen and
monitored by the FISA Court, a specially established Federal court comprised of 11 Federal
judges appointed by the Chief Justice of the United States.
o The FISC must approve targeting and minimization procedures under Section 702
prior to the acquisition of any surveillance information.
 Targeting procedures are designed to ensure that an acquisition targets non-
U.S. persons reasonably believed to be outside the United States for specific
purposes, and also that it does not intentionally acquire a communication
when all the parties are known to be inside the US.
 Minimization procedures govern how the Intelligence Community (IC) treats
the information concerning any U.S. persons whose communications might
be incidentally intercepted and regulate the handling of any nonpublic
information concerning U.S. persons that is acquired, including whether
information concerning a U.S. person can be disseminated. Significantly, the
dissemination of information about U.S. persons is expressly prohibited
unless it is necessary to understand foreign intelligence or assess its
importance, is evidence of a crime, or indicates a threat of death or serious
bodily harm.
 The Congress. After extensive public debate, the Congress reauthorized Section 702 in
December 2012.
o The law specifically requires a variety of reports about Section 702 to the Congress.
 The DNI and AG provide exhaustive semiannual reports assessing
compliance with the targeting and minimization procedures.
 These reports, along with FISA Court opinions, and a semi-annual report by
the Attorney General are provided to Congress. In short, the information
provided to Congress by the Executive Branch with respect to these activities
provides an unprecedented degree of accountability and transparency.
o In addition, the Congressional Intelligence and Judiciary Committees are regularly
briefed on the operation of Section 702.
 The Executive. The Executive Branch, including through its independent Inspectors General,
carries out extensive oversight of the use of Section 702 authorities, which includes regular
on-site reviews of how Section 702 authorities are being implemented. These regular
reviews are documented in reports produced to Congress. Targeting decisions are reviewed
by ODNI and DOJ.
o Communications collected under Section 702 have provided the Intelligence
Community insight into terrorist networks and plans. For example, the Intelligence
3
Community acquired information on a terrorist organization’s strategic planning
efforts.
o Communications collected under Section 702 have yielded intelligence regarding
proliferation networks and have directly and significantly contributed to successful
operations to impede the proliferation of weapons of mass destruction and related
technologies.
o Communications collected under Section 702 have provided significant and unique
intelligence regarding potential cyber threats to the United States including specific
potential computer network attacks. This insight has led to successful efforts to
mitigate these threats.

More Related Content

What's hot

Еxhibit
ЕxhibitЕxhibit
Еxhibit
BabelNews
 
RTI ACT 2005 PART-II
RTI ACT 2005 PART-IIRTI ACT 2005 PART-II
RTI ACT 2005 PART-II
Avinash Kumar Gupta
 
Article 356
Article 356Article 356
Article 356
jyoti dharm
 
44th Constitution Amendment
44th Constitution Amendment44th Constitution Amendment
44th Constitution Amendment
Satheesh Kumar
 
Political Parties Order 2002 (Amended 2002, 2004, 2011)
Political Parties Order 2002 (Amended 2002, 2004, 2011)Political Parties Order 2002 (Amended 2002, 2004, 2011)
Political Parties Order 2002 (Amended 2002, 2004, 2011)
fatanews
 
Public Sector Pension Plans
Public Sector Pension PlansPublic Sector Pension Plans
Public Sector Pension Plans
CBIZ, Inc.
 
Presidential rule in states
Presidential rule in states Presidential rule in states
Presidential rule in states
Gurjot Singh
 
Ekiti State Freedom Of Information Law
Ekiti State Freedom Of Information LawEkiti State Freedom Of Information Law
Ekiti State Freedom Of Information Law
Government of Ekiti State, Nigeria
 
Article 356
Article 356Article 356
Article 356
shivangini142
 
Emergency Provisions
Emergency ProvisionsEmergency Provisions
Emergency Provisions
sufi shahi
 
Right to information Act(India)
Right to information Act(India)Right to information Act(India)
Right to information Act(India)Linel Dias
 
RTI ACT PPT
RTI ACT PPTRTI ACT PPT
RTI ACT PPT
Raman Sharma
 
Departmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witnessDepartmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witness
gururaj lulkarni
 
2008 Russian Procuracy's Investigative Committee
2008    Russian Procuracy's Investigative Committee2008    Russian Procuracy's Investigative Committee
2008 Russian Procuracy's Investigative Committee
Ethan Burger
 
Cia 2011-0005-0001
Cia 2011-0005-0001Cia 2011-0005-0001
Cia 2011-0005-0001
Margus Meigo
 
RTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINT
RTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINTRTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINT
RTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINT
Prakash Prakash
 
LEGAL SYSTEM WEEK 1.docx
LEGAL SYSTEM WEEK 1.docxLEGAL SYSTEM WEEK 1.docx
LEGAL SYSTEM WEEK 1.docx
ABDUL240492
 
Uae deportation what you must do in the process
Uae deportation   what you must do in the processUae deportation   what you must do in the process
Uae deportation what you must do in the process
Dr. Hassan Mohsen
 
3. james devlin presentation slides a perspective on costs
3. james devlin presentation slides a perspective on costs3. james devlin presentation slides a perspective on costs
3. james devlin presentation slides a perspective on costs
ELIGConference
 

What's hot (19)

Еxhibit
ЕxhibitЕxhibit
Еxhibit
 
RTI ACT 2005 PART-II
RTI ACT 2005 PART-IIRTI ACT 2005 PART-II
RTI ACT 2005 PART-II
 
Article 356
Article 356Article 356
Article 356
 
44th Constitution Amendment
44th Constitution Amendment44th Constitution Amendment
44th Constitution Amendment
 
Political Parties Order 2002 (Amended 2002, 2004, 2011)
Political Parties Order 2002 (Amended 2002, 2004, 2011)Political Parties Order 2002 (Amended 2002, 2004, 2011)
Political Parties Order 2002 (Amended 2002, 2004, 2011)
 
Public Sector Pension Plans
Public Sector Pension PlansPublic Sector Pension Plans
Public Sector Pension Plans
 
Presidential rule in states
Presidential rule in states Presidential rule in states
Presidential rule in states
 
Ekiti State Freedom Of Information Law
Ekiti State Freedom Of Information LawEkiti State Freedom Of Information Law
Ekiti State Freedom Of Information Law
 
Article 356
Article 356Article 356
Article 356
 
Emergency Provisions
Emergency ProvisionsEmergency Provisions
Emergency Provisions
 
Right to information Act(India)
Right to information Act(India)Right to information Act(India)
Right to information Act(India)
 
RTI ACT PPT
RTI ACT PPTRTI ACT PPT
RTI ACT PPT
 
Departmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witnessDepartmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witness
 
2008 Russian Procuracy's Investigative Committee
2008    Russian Procuracy's Investigative Committee2008    Russian Procuracy's Investigative Committee
2008 Russian Procuracy's Investigative Committee
 
Cia 2011-0005-0001
Cia 2011-0005-0001Cia 2011-0005-0001
Cia 2011-0005-0001
 
RTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINT
RTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINTRTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINT
RTI ACT, 2005 PROCEDURE FOR REQUESTING APPLICATION, APPEAL, COMPLAINT
 
LEGAL SYSTEM WEEK 1.docx
LEGAL SYSTEM WEEK 1.docxLEGAL SYSTEM WEEK 1.docx
LEGAL SYSTEM WEEK 1.docx
 
Uae deportation what you must do in the process
Uae deportation   what you must do in the processUae deportation   what you must do in the process
Uae deportation what you must do in the process
 
3. james devlin presentation slides a perspective on costs
3. james devlin presentation slides a perspective on costs3. james devlin presentation slides a perspective on costs
3. james devlin presentation slides a perspective on costs
 

Similar to Facts on the collection of intelligence pursuant to section 702

Cia sigint activities
Cia sigint activitiesCia sigint activities
Cia sigint activitiesAnonDownload
 
Cia sigint activities
Cia sigint activitiesCia sigint activities
Cia sigint activitiesRepentSinner
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
LeonardN9WWelchw
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
Joseph V. Moreno
 
National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013The Hacker News
 
CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]Heriberto Luna
 
Jamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business communityJamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business community
Emerson Bryan
 
Lindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay Boyd
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
Bryan Gaston
 
Indonesian Legislatives Passes Personal Data Protection Bill.pdf
Indonesian Legislatives Passes Personal Data Protection Bill.pdfIndonesian Legislatives Passes Personal Data Protection Bill.pdf
Indonesian Legislatives Passes Personal Data Protection Bill.pdf
AHRP Law Firm
 
Please answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfPlease answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdf
agarshailenterprises
 
Constitutional law project (1)
Constitutional law project (1)Constitutional law project (1)
Constitutional law project (1)
PreetPatel74
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
philipnelson29183
 
 This is a graded discussion 30 points possibledue -.docx
 This is a graded discussion 30 points possibledue -.docx This is a graded discussion 30 points possibledue -.docx
 This is a graded discussion 30 points possibledue -.docx
lillie234567
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
JakeAldrinDegala1
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
Shirley Ingles-Cruz
 
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...
Shion Kib
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
data brackets
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summarysevans-idaho
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
Wendy Knox Everette
 

Similar to Facts on the collection of intelligence pursuant to section 702 (20)

Cia sigint activities
Cia sigint activitiesCia sigint activities
Cia sigint activities
 
Cia sigint activities
Cia sigint activitiesCia sigint activities
Cia sigint activities
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
 
National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013
 
CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]CJIS Projects NICS 2015 v2 [Autosaved]
CJIS Projects NICS 2015 v2 [Autosaved]
 
Jamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business communityJamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business community
 
Lindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_Article
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 
Indonesian Legislatives Passes Personal Data Protection Bill.pdf
Indonesian Legislatives Passes Personal Data Protection Bill.pdfIndonesian Legislatives Passes Personal Data Protection Bill.pdf
Indonesian Legislatives Passes Personal Data Protection Bill.pdf
 
Please answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfPlease answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdf
 
Constitutional law project (1)
Constitutional law project (1)Constitutional law project (1)
Constitutional law project (1)
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
 This is a graded discussion 30 points possibledue -.docx
 This is a graded discussion 30 points possibledue -.docx This is a graded discussion 30 points possibledue -.docx
 This is a graded discussion 30 points possibledue -.docx
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Str...
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 

More from Christian Habermueller

computerarchiv-muenchen.de - Jahrekalender 2017 | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2017  | C.Habermuellercomputerarchiv-muenchen.de - Jahrekalender 2017  | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2017 | C.Habermueller
Christian Habermueller
 
Produktives Arbeiten mit freier Software | C.Habermueller
Produktives Arbeiten mit freier Software | C.HabermuellerProduktives Arbeiten mit freier Software | C.Habermueller
Produktives Arbeiten mit freier Software | C.Habermueller
Christian Habermueller
 
IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...
IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...
IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...
Christian Habermueller
 
Ein Entwickler ist mehr als nur ein Applications-Coder | C.Habermueller
Ein Entwickler ist mehr als nur ein Applications-Coder | C.HabermuellerEin Entwickler ist mehr als nur ein Applications-Coder | C.Habermueller
Ein Entwickler ist mehr als nur ein Applications-Coder | C.Habermueller
Christian Habermueller
 
computerarchiv-muenchen.de - Jahrekalender 2016 | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2016  | C.Habermuellercomputerarchiv-muenchen.de - Jahrekalender 2016  | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2016 | C.Habermueller
Christian Habermueller
 
Datenschutzbestimmungen von Microsoft - Stand Juli 2015
Datenschutzbestimmungen von Microsoft - Stand Juli 2015Datenschutzbestimmungen von Microsoft - Stand Juli 2015
Datenschutzbestimmungen von Microsoft - Stand Juli 2015
Christian Habermueller
 
Rapid Application Development | C.Habermueller
Rapid Application Development | C.HabermuellerRapid Application Development | C.Habermueller
Rapid Application Development | C.HabermuellerChristian Habermueller
 
[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)
[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)
[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)Christian Habermueller
 
Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?
Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?
Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?Christian Habermueller
 
Breitband-Verfuegbarkeit Deutschland
Breitband-Verfuegbarkeit DeutschlandBreitband-Verfuegbarkeit Deutschland
Breitband-Verfuegbarkeit Deutschland
Christian Habermueller
 
Breitband-Verfügbarkeit Deutschland 2010
Breitband-Verfügbarkeit Deutschland 2010Breitband-Verfügbarkeit Deutschland 2010
Breitband-Verfügbarkeit Deutschland 2010
Christian Habermueller
 
E10 Verträglichkeit von Kraftfahrzeugen
E10 Verträglichkeit von Kraftfahrzeugen E10 Verträglichkeit von Kraftfahrzeugen
E10 Verträglichkeit von Kraftfahrzeugen
Christian Habermueller
 
Service Operation mit ITIL | C.Habermueller
Service Operation mit ITIL | C.HabermuellerService Operation mit ITIL | C.Habermueller
Service Operation mit ITIL | C.HabermuellerChristian Habermueller
 
IBM Lotus Notes Domino Security mit ITIL | C.Habermueller
IBM Lotus Notes Domino Security mit ITIL | C.HabermuellerIBM Lotus Notes Domino Security mit ITIL | C.Habermueller
IBM Lotus Notes Domino Security mit ITIL | C.HabermuellerChristian Habermueller
 
Domino Security mit ITIL | C.Habermueller
Domino Security mit ITIL | C.HabermuellerDomino Security mit ITIL | C.Habermueller
Domino Security mit ITIL | C.HabermuellerChristian Habermueller
 
Gratis Comic Tag 2010
Gratis Comic Tag 2010Gratis Comic Tag 2010
Gratis Comic Tag 2010
Christian Habermueller
 

More from Christian Habermueller (20)

computerarchiv-muenchen.de - Jahrekalender 2017 | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2017  | C.Habermuellercomputerarchiv-muenchen.de - Jahrekalender 2017  | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2017 | C.Habermueller
 
Produktives Arbeiten mit freier Software | C.Habermueller
Produktives Arbeiten mit freier Software | C.HabermuellerProduktives Arbeiten mit freier Software | C.Habermueller
Produktives Arbeiten mit freier Software | C.Habermueller
 
IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...
IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...
IBM Domino Notes Database Security - Analyse, Konzept und Techniken | C.Haber...
 
Ein Entwickler ist mehr als nur ein Applications-Coder | C.Habermueller
Ein Entwickler ist mehr als nur ein Applications-Coder | C.HabermuellerEin Entwickler ist mehr als nur ein Applications-Coder | C.Habermueller
Ein Entwickler ist mehr als nur ein Applications-Coder | C.Habermueller
 
computerarchiv-muenchen.de - Jahrekalender 2016 | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2016  | C.Habermuellercomputerarchiv-muenchen.de - Jahrekalender 2016  | C.Habermueller
computerarchiv-muenchen.de - Jahrekalender 2016 | C.Habermueller
 
Datenschutzbestimmungen von Microsoft - Stand Juli 2015
Datenschutzbestimmungen von Microsoft - Stand Juli 2015Datenschutzbestimmungen von Microsoft - Stand Juli 2015
Datenschutzbestimmungen von Microsoft - Stand Juli 2015
 
Rapid Application Development | C.Habermueller
Rapid Application Development | C.HabermuellerRapid Application Development | C.Habermueller
Rapid Application Development | C.Habermueller
 
[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)
[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)
[CeBIT 2012] Microsoft Agenda Centerstage Deutsch (german)
 
Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?
Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?
Welche Viren-Schutzprogramme erkennen den Bundes- bzw. Staats-Trojaner ?
 
Breitband-Verfuegbarkeit Deutschland
Breitband-Verfuegbarkeit DeutschlandBreitband-Verfuegbarkeit Deutschland
Breitband-Verfuegbarkeit Deutschland
 
Breitband-Verfügbarkeit Deutschland 2010
Breitband-Verfügbarkeit Deutschland 2010Breitband-Verfügbarkeit Deutschland 2010
Breitband-Verfügbarkeit Deutschland 2010
 
E10 Verträglichkeit von Kraftfahrzeugen
E10 Verträglichkeit von Kraftfahrzeugen E10 Verträglichkeit von Kraftfahrzeugen
E10 Verträglichkeit von Kraftfahrzeugen
 
Service Operation mit ITIL | C.Habermueller
Service Operation mit ITIL | C.HabermuellerService Operation mit ITIL | C.Habermueller
Service Operation mit ITIL | C.Habermueller
 
IBM Lotus Notes Domino Security mit ITIL | C.Habermueller
IBM Lotus Notes Domino Security mit ITIL | C.HabermuellerIBM Lotus Notes Domino Security mit ITIL | C.Habermueller
IBM Lotus Notes Domino Security mit ITIL | C.Habermueller
 
2010 09 22 AdminCamp News Wednesday
2010 09 22 AdminCamp News Wednesday2010 09 22 AdminCamp News Wednesday
2010 09 22 AdminCamp News Wednesday
 
Domino Security mit ITIL | C.Habermueller
Domino Security mit ITIL | C.HabermuellerDomino Security mit ITIL | C.Habermueller
Domino Security mit ITIL | C.Habermueller
 
2010 09 21 AdminCamp News Tuesday
2010 09 21 AdminCamp News Tuesday2010 09 21 AdminCamp News Tuesday
2010 09 21 AdminCamp News Tuesday
 
2010 09 20 AdminCamp News Monday
2010 09 20 AdminCamp News Monday2010 09 20 AdminCamp News Monday
2010 09 20 AdminCamp News Monday
 
Using IBM Lotus Notes 8
Using IBM Lotus Notes 8Using IBM Lotus Notes 8
Using IBM Lotus Notes 8
 
Gratis Comic Tag 2010
Gratis Comic Tag 2010Gratis Comic Tag 2010
Gratis Comic Tag 2010
 

Recently uploaded

Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 

Recently uploaded (15)

Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 

Facts on the collection of intelligence pursuant to section 702

  • 1. 1 DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 June 8, 2013 Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act  PRISM is not an undisclosed collection or data mining program. It is an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a). This authority was created by the Congress and has been widely known and publicly discussed since its inception in 2008.  Under Section 702 of FISA, the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence. In short, Section 702 facilitates the targeted acquisition of foreign intelligence information concerning foreign targets located outside the United States under court oversight. Service providers supply information to the Government when they are lawfully required to do so.  The Government cannot target anyone under the court-approved procedures for Section 702 collection unless there is an appropriate, and documented, foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States. We cannot target even foreign persons overseas without a valid foreign intelligence purpose.  In addition, Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States. Likewise, Section 702 cannot be used to target a person outside the United States if the purpose is to acquire information from a person inside the United States.  Finally, the notion that Section 702 activities are not subject to internal and external oversight is similarly incorrect. Collection of intelligence information under Section 702 is subject to an extensive oversight regime, incorporating reviews by the Executive, Legislative and Judicial branches.
  • 2. 2  The Courts. All FISA collection, including collection under Section 702, is overseen and monitored by the FISA Court, a specially established Federal court comprised of 11 Federal judges appointed by the Chief Justice of the United States. o The FISC must approve targeting and minimization procedures under Section 702 prior to the acquisition of any surveillance information.  Targeting procedures are designed to ensure that an acquisition targets non- U.S. persons reasonably believed to be outside the United States for specific purposes, and also that it does not intentionally acquire a communication when all the parties are known to be inside the US.  Minimization procedures govern how the Intelligence Community (IC) treats the information concerning any U.S. persons whose communications might be incidentally intercepted and regulate the handling of any nonpublic information concerning U.S. persons that is acquired, including whether information concerning a U.S. person can be disseminated. Significantly, the dissemination of information about U.S. persons is expressly prohibited unless it is necessary to understand foreign intelligence or assess its importance, is evidence of a crime, or indicates a threat of death or serious bodily harm.  The Congress. After extensive public debate, the Congress reauthorized Section 702 in December 2012. o The law specifically requires a variety of reports about Section 702 to the Congress.  The DNI and AG provide exhaustive semiannual reports assessing compliance with the targeting and minimization procedures.  These reports, along with FISA Court opinions, and a semi-annual report by the Attorney General are provided to Congress. In short, the information provided to Congress by the Executive Branch with respect to these activities provides an unprecedented degree of accountability and transparency. o In addition, the Congressional Intelligence and Judiciary Committees are regularly briefed on the operation of Section 702.  The Executive. The Executive Branch, including through its independent Inspectors General, carries out extensive oversight of the use of Section 702 authorities, which includes regular on-site reviews of how Section 702 authorities are being implemented. These regular reviews are documented in reports produced to Congress. Targeting decisions are reviewed by ODNI and DOJ. o Communications collected under Section 702 have provided the Intelligence Community insight into terrorist networks and plans. For example, the Intelligence
  • 3. 3 Community acquired information on a terrorist organization’s strategic planning efforts. o Communications collected under Section 702 have yielded intelligence regarding proliferation networks and have directly and significantly contributed to successful operations to impede the proliferation of weapons of mass destruction and related technologies. o Communications collected under Section 702 have provided significant and unique intelligence regarding potential cyber threats to the United States including specific potential computer network attacks. This insight has led to successful efforts to mitigate these threats.