- This ‘Sailor Moon’ game brings us back to the ’90s in the best way 5 Years Ago
- Teacher who said holidays are ‘difficult’ gets heartwarming surprise from students 5 Years Ago
- Fox News blames ‘weaponized’ social media for Tucker Carlson backlash 5 Years Ago
- Report: Black women receive way more abusive tweets than white women Today 8:34 AM
- Roger Stone to publicly apologize for spreading lies on InfoWars Today 8:13 AM
- Netflix true crime series ‘The Innocent Man’ is a missed opportunity Today 7:31 AM
- What can we learn from Ivanka Trump’s private email server? Today 7:30 AM
- How to watch National Geographic online for free Today 7:30 AM
- Bongo Cat proves that the internet still loves cats Today 7:00 AM
- Organize your life with the 10 best free calendar apps Today 6:00 AM
- How many devices can you stream YouTube TV with at once? Today 6:00 AM
- Watch Tiffany Pollard sell the sh*t out of Fenty Beauty makeup Monday 8:05 PM
- Speech pathologist sues Texas school district for right to boycott Israel Monday 5:25 PM
- ‘Fresh Prince’ actor sues Fortnite developer for using the Carlton dance Monday 4:40 PM
- 3D-printed head fools Android facial recognition Monday 3:01 PM
Le Monde’s leaks from Edward Snowden didn’t just reveal that the NSA tracks French citizens. It gives insight into the agency’s practices around the world.
It offered a little more insight into the NSA’s controversial, mysterious program called PRISM by releasing an additional three slides from the agency’s PowerPoint presentation on the subject.
PRISM was the second program made public after being leaked by former NSA contractor Edward Snowden, and few have so captured the public’s imagination. Marked with an ominous prism logo, NSA’s slides described the program as offering “direct access” to nine American companies’ users’ files, including Google, Facebook, and Yahoo. Those companies fiercely responded with very carefully tailored rebuttals that said they hadn’t willingly engaged in any big government spy program, with the very notable exception of when they were compelled to by secret law.
The first of the three new slides shows that the NSA makes it regular practice to use PRISM in conjunction with upstream collection—the process where the agency gets Internet information as it travels through major communications hubs. Together, the two processes can compile a remarkable amount of information on a target: old communications and new, and what the target’s doing online in real-time. “DNI selectors” refers to keywords the NSA can search for—are they using a certain term online today? Does that word show up in their old Yahoo emails?
The second appears to show something of a success story. NSA director Keith Alexander has tried to brag about NSA programs catching illegal activity before it happens, though that’s largely been very vague instances of thwarted terrorist attacks that didn’t clearly need NSA intelligence to stop.
On Dec. 14, 2012, the slide says, the NSA Threat Operations Center spied that someone was trying to get 150GB worth of information from a defense contractor, using the combined tools of PRISM and the upstream collection program Stormbrew. NTOC alerted the FBI, which in turn worked with the contractor to stop the attack.
NSA watchdog blog Empty Wheel noted that this is indicative of the fact that, as much as NSA defenders tout the agency’s ability to stop terrorism, it’s far more accomplished at stopping cyberattacks.
The final slide shows approximately 50 “high volume” domain names that the NSA collected information from. Le Monde notes this refers only to the 30-day period from Jan. 1-30, 2013. The paper redacted nearly all of the domains for fear of interrupting ongoing investigation. Wanadoo, since rebranded as Orange, is an Internet service provider that operates in Europe and the Middle East. Alcatel-Lucent is a French telecommunications company that offers substantial cloud storage services.
Whether the slides released so far explain the program’s full mechanics is still unclear. But it’s safe to say that as recently as this year, it was an active program, one used in conjunction with the ability to search Internet traffic in almost real-time, to track the U.S.’s perceived enemies.
Photo by El Bibliomata/Flickr. Remix by Fernando Alfonso III
A former senior politics reporter for the Daily Dot, Kevin Collier focuses on privacy, cybersecurity, and issues of importance to the open internet. Since leaving the Daily Dot in March 2016, he has served as a reporter for Vocativ and a cybersecurity correspondent for BuzzFeed.