Updated June 29, 2013
from
WashingtonPost Website
The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA).
Some documents describing the program were first released by The Washington Post on June 6.
The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies.
These slides, annotated by The Post,
represent a selection from the overall document, and certain
portions are redacted.
Read related article.
Acquiring data from a new target
The supervisor must endorse the analyst's "reasonable belief," defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.
Analyzing information collected from private
companies
Each target is assigned a case notation
Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as "Surveillance").
Searching the PRISM database
The slide does not show how many other Internet users, and among them how many Americans, have their communications collected "incidentally" during surveillance of those targets.
Original slides published June 6
Monitoring a target's communication
Providers and data
Participating providers
|