PRISM–Is it Our Fault?
I’ve not commented on NSA’s PRISM program up to this point because, as a former intelligence officer and senior IT professional, I recognize there are many layers to it, and I wanted to address them as cogently and accurately as possible.
Most Americans understand and accept that the interception and analysis of foreign communications is essential to developing effective intelligence. This is an historical and necessary function in the intelligence cycle.
The prevalence of the Internet, however, is a game changer, because most communications, even from other countries, travel through U.S.-based servers.
Intelligence agencies, therefore, require permission from the U.S. owners of these assets to monitor them. Intelligence agencies have to demonstrate that a particular thread of communications from a foreign source warrants attention, and so they make their case to the secret Foreign Intelligence Surveillance Court, mirroring the act of domestic law enforcement agencies securing a search warrant. Once they have this warrant, the companies are lawfully obligated to provide them access.
I’ve not commented on NSA’s PRISM program up to this point because, as a former intelligence officer and senior IT professional, I recognize there are many layers to it, and I wanted to address them as cogently and accurately as possible.
Most Americans understand and accept that the interception and analysis of foreign communications is essential to developing effective intelligence. This is an historical and necessary function in the intelligence cycle.
The prevalence of the Internet, however, is a game changer, because most communications, even from other countries, travel through U.S.-based servers.
Intelligence agencies, therefore, require permission from the U.S. owners of these assets to monitor them. Intelligence agencies have to demonstrate that a particular thread of communications from a foreign source warrants attention, and so they make their case to the secret Foreign Intelligence Surveillance Court, mirroring the act of domestic law enforcement agencies securing a search warrant. Once they have this warrant, the companies are lawfully obligated to provide them access.