google, youtube, yahoo! and five other big names. in short, a direct line into your online life. the fbi, national security agency are doing it, according to a report in the washington post and britain s guardian newspaper, they have been doing it for the last six years. part of a highly classified, never before disclosed intelligence gathering program code named prism. according to the reporting it began during the bush administration but has grown sharply, exponentially, during the obama years. the fbi and nsa vacuuming up your e-mails, online pictures, audio, video, by tapping directly into the servers of those five companies i mentioned, plus microsoft, pal talk, aol, skype, apple and soon, according to the post dropbox. the post and guardian reporting that prism use the data feed as raw material for a massive data mining operation aimed at spotting patterns that might provide early warning of a terrorist attack.
plugging directly into facebook, google, youtube, yahoo! and five other big names. in short, a direct line into your online life. the fbi, national security agency are doing it, according to a report in the washington post and britain s guardian newspaper, they have been doing it for the last six years. part of a highly classified, never before disclosed intelligence gathering program code named prism. according to the reporting it began during the bush administration but has grown sharply, exponentially, during the obama years. the fbi and nsa vacuuming up your e-mails, online pictures, audio, video, by tapping directly into the servers of those five companies i mentioned, plus microsoft, pal talk, aol, skype, apple and soon, according to the post dropbox. the post and guardian reporting that prism use the data feed as raw material for a massive data mining operation aimed at spotting patterns that might provide early warning of a terrorist attack. as we said, it comes hard on t
the storm could pick up momentum as it goes up the eastern seaboard and causes problems for the states in the eye of the storm and in the coming hours and coming days. christi. yeah, i see the sun peaking out behind you. you, the crew, everybody on the beach watching it. take good care, glad everybody is all right. as you know, waking up to the realization that our government may know far more about our electronic communications than we ever could have imagined. phone records, e-mail, pictures, status updates, both the washington post and the guardi guardian say that the nsa has access to the servers at top technology programs through a program prism. those being microsoft, apple, youtube, yahoo! google, facebook, pal talk, skype, and aol. one of those to first detail the
the season comes ashore. tens of millions of people in its path. a lot to get to tonight. we begin with breaking news. it goes far beyond the government just accessing your cell phone records. that was the first shoe to drop. the second shoe fell late today. they re looking at your internet access as well. plugging directly into facebook, google, youtube, yahoo! and five other big names. in short, a direct line into your online life. the fbi, national security agency are doing it, according to a report in the washington post and britain s guardian newspaper, they have been doing it for the last six years. part of a highly classified, never before disclosed intelligence gathering program code named prism. according to the reporting it began during the bush administration but has grown sharply, exponentially, during the obama years. the fbi and nsa vacuuming up your e-mails, online pictures, audio, video, by tapping directly into the servers of those five companies i mentioned, plu
intelligence in the president s daily intelligence briefing, which has cited 1,477 dimfferen items last year along. the nine companies cooperating are microsoft, yahoo!, google, facebook, pal talk, aol, skype, youtube and apple. late thursday, some of the companies named in the post story responded, insisting they don t provide any government agency with are direct access to their services. james clapper defended the program and said quote information collected under this program is the most important intelligence we collect and added the unauthorized disclosure about this program is reprehensible. a senior administration official says the program quote involves extentive procedures approved by the court to ensure this only