Financial Relationships Revealed: NSA Paid Millions to Google, Yahoo, Facebook, Microsoft for PRISM Compliance
Thanks to Golden Age of Gaia.
Stephen Cook: OK, here we go…a new round of increasingly-damaging revelations about the NSA’s secret surveillance program PRISM – this time showing the existence of financial relationships with the major global online and social media providers. Unsurprisingly, they were all compliant – in sharing our private conversations, information, emails, data and more – for top dollar.
• Top-secret files show first evidence of financial relationship • Prism companies include Google and Yahoo, says NSA • Costs were incurred after 2011 FISA court ruling
By Ewen MacAskill in New York, The Guardian – August 23, 2013
The material provides the first evidence of a financial relationship between the tech companies and the NSA.
The National Security Agency paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance program after a court ruled that some of the agency’s activities were unconstitutional, according to top-secret material passed to the Guardian. Read the rest of this entry
Written by Gregory Ferenstein, TechCrunch.com
The Guardian revealed more top-secret documents alleging that both Skype and Microsoft cooperated with U.S. spy agencies to give away the content of email and video chats. Though it’s unclear whether the collection of this data was indiscriminate or targeted at specific subjects, the language of the documents indicate that the NSA may not have needed an individual warrant for each request.
“Collaborative teamwork was the key to the successful addition of another provider to the Prism system,” the documents read. “This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established.”
The NSA reportedly had access to pre-encrypted data, “For Prism collection against Hotmail, Live, and Outlook.com emails will be unaffected because Prism collects this data prior to encryption.” Read the rest of this entry