If the disclosure of a top-secret court order requiring Verizon to turn over call records to the National Security Agency stirred renewed anger at the "surveillance state" that's arisen since 9/11 and passage of the Patriot Act, the latest allegations could prompt a real furor - not to mention lots of gallows humor about who's peeking at your emails and chats.
Britain's Guardian newspaper and the Washington Post both reported Thursday night that under a 2007 program called PRISM, the NSA and FBI have been able to tap into Internet content controlled by Microsoft, Google, Facebook and other leading companies to mine communications involving at least one person believed to be overseas - and that more than so-called "metadata," or records about the communications, is involved.
The Post says that with PRISM, the NSA and FBI are "tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post."
U.S. intelligence officials quickly criticized the reports and said they were inaccurate. The Post reported:
The Guardian report, co-authored by Glenn Greenwald, author of Wednesday's report on the Verizon call records, said that unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata."
The Post, which posted a top-secret PowerPoint presentation describing the program and leaked to both papers, said:
One unidentified official told the New York Times Thursday night that the Internet data mining was carefully limited to comply with the law. "'The law does not allow the targeting of any U.S. citizen or of any person located within the United States,' said the official, who insisted on anonymity to discuss the classified program. 'Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.'"
The Post's report said establishing the "foreignness" of a target has proven to be a tough challenge:
The Times suggested that the timing of the leaks to the Guardian, in rapid succession, may be linked to the current blowback over U.S. investigations of previous security leaks. But as the Times points out, the disclosures of highly classified documents comes as President Obama prepares to meet with Chinese President Xi Jinping in part to address complaints about Chinese cyberattacks and espionage - a conversation that will now "take place amid discussion of America's own vast surveillance operations on its own citizens."